News

2018-10-18

Corporate Cybercrime - A Hacker’s Point Of View

It only takes one cleverly worded email for hackers to attack your system from the inside out. Who are they and what do they stand to gain?

2018-10-15

Blockchain As A Service Market To Reach $7 Billion

A recent analysis by Bank of America suggests that blockchain adoption will soon become a multi-billions dollar business.

2018-10-15

AI Hyperdrives Into Outer Space

Future deep space missions are likely to be turbo-charged by Artificial Intelligence on their voyage to comets, moons and the planets.

2018-10-17

Artificial Intelligence - What We Need To Know

The trouble with the term artificial intelligence is the word 'intelligence'. It should not be confused with human sentience.

2018-10-16

US And France To Permit Fully Driverless Cars On Public Roads

The USA and France are developing safety standards and regulations to allow fully driverless vehicles on public roads.

2018-10-16

Stop US School Shootings With AI

A new artificial intelligence security system is aiming to give parents and their kids some additional peace of mind.

2018-10-16

New Google App Fights Censorship

A new Google app has recently been launched aimed at protecting users from state-sponsored censorship.

2018-10-15

Cyberattack Revelations Appear To Undercut Russia's UN Efforts

Russia is planning to submit two UN resolutions later this month, one regulate states behaviour in cyberspace and one on a cybercrime convention.

2018-10-16

Pentagon Weapons Systems Vulnerable To Cyber-Attacks

Issues included being able to turn a weapon on or off, affect missile targeting, adjust oxygen levels or manipulate what is seen on control screens.

2018-10-12

Chinese Spy Extradited To Go On Trial

A man the US claims is a Chinese intelligence officer stands accused of trying to steal aviation technology and faces up to 25 years in jail.

2018-10-12

Neither US Or UK  Investigated Chinese Spy Chips

Apple, Amazon and Super Micro strongly deny a bombshell report about implanted spy chips and they are supported by the DHS and the NCSC.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Cryptoloc

Cryptoloc

Cryptoloc's core business is developing solutions designed to protect businesses from all kinds of security threats using a unique patented cryptography.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Pires Investments

Pires Investments

Pires is building an investment portfolio of high-tech businesses across areas such as Artificial Intelligence, Internet of Things, Cyber Security and Augmented/Virtual Reality.

link22

link22

link22 offers a high level of expertise within IT security and system solutions. We help public and private actors with highly secure IT-solutions.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

Argenta Talent Acquisition

Argenta Talent Acquisition

Argenta Talent Acquisition is a recruitment partner specializing in Space and Defense, Intelligence Community, all things Technical, Cyber, and Logistics.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.

Octane

Octane

Octane is an AI cybersecurity startup using machine learning to identify and fix vulnerabilities in blockchain codebases.