News

2019-02-08

Blockchain Improves Multicloud Network Management

Companies struggle to manage complex existing networks and multiple clouds as well as the associated security strains. Blockchain can help.

2019-02-07

Going Postal: ‘We Have Sent You a Message’

Don't be fooled by the latest email fraud campaign pretending to be from the US Postal Service and aimed at infecting your computer with malware.

2019-02-06

President Putin Wants A National AI Strategy

President Putin wants to build a national strategy for artificial intelligence as a critical tool for future economic and military power.

2019-02-06

N. Korea Could Expand Cyber Espionage Activities

In response to the stifling effects of international sanctions, N Korea's hackers could become more important to the regime than ever before.

2019-02-05

Britain Aims To Lead In CyberSecurity

The UK is investing £70m from its industrial strategy fund for new hardware to speed up the race to eradicate damaging cybersecurity threats.

2019-02-05

AI Based Security Analytics Is Growing Fast

The AI-based security analytics and threat intelligence platform RANK Software more than doubled its business last year. What's next?

2019-02-05

The Biter Bit: Secret Russian Files Are Leaked

The transparency advocacy group DDoSecrets has released 175 gigabytes of hacked Russian documents detailing the 'dark side' of the Kremlin.

2019-02-07

No Brexit Deal? Then Its ‘Digital Dover’

What will happen to UK digital activities - from search and display advertising through to online publishing and e-commerce - with no Brexit deal?

2019-02-04

AI In Business: 2019 Trends & Predictions

While robots will be taking over the workplace, some experts are predicting that it will actually improve and create new jobs for people.

2019-02-04

US National Intelligence Cyber Threats Strategy 2019

The latest National Intelligence Strategy sets out the way the US Intelligence Community will deal with Cyber Threats for the next four years.

2019-02-01

Geo-Political Tensions Are Fuelling Cyber Attacks

Carbon Black's latest Threat Report reveals just how sophisticated attackers have become in evolving to remain undetected.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm. We specialise in Risk Consulting, Security Intelligence, Geopolitical Intelligence, Cyber Security, Digital Forensics, and TSCM.