News

2017-10-04

A Global Issue: Cybercrime In Singapore

Cybercrime in Singapore nearly doubled between 2014 and 2016 and it is a penalty of a high level of connectivity.

2017-10-04

The Shifting Sands of Cybersecurity

Today’s security teams need to come up with new tactics to fend off more advanced threats from increasingly interconnected enterprise networks.

2017-10-04

What is Big Data?

When people talk about big data, they mean the ability to take large portions of data, analyse it and make it useful. But it is really more than that.

2017-10-03

AI Makes People In Your Business More Important

AI is already a part of consumer applications and is fast becoming a larger part of our work environment. But if you want subtlety, get a human.

2017-10-03

In The House Or In The Cloud: Which Is More Secure?

There are many reasons to deliberate carefully before choosing an in-house or cloud service delivery model.

2017-10-02

Big Data - Big Changes Coming

There is one hurdle to the rapid growth of data; the shortage of highly skilled individuals who can analyse and crunch the data to make it valuable.

2017-10-02

Local Government Computer Systems Are Soft Targets

Even a small vulnerability can lead to big problems. A hack affecting NY state police illustrates the vulnerability of local government networks.

2017-10-02

Robots Take Over The World’s Work

For so many jobs, machines are faster, more consistent, smarter, and cheaper than you or I will ever be. So why not tax them?

2017-09-29

AI Is Streamlining Marketing & Sales

Artificial Intelligence and autonomous algorithms are making and saving money every day for the businesses that deploy them.

2017-09-29

Put Your Physical Security Into The Cloud

The cloud revolution has the potential to change every aspect of physical security, offering ways of doing things that never existed before.

2017-09-29

India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the unregulated use of drones and the constant threat from terror groups.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

iXsystems

iXsystems

iXsystems is a leader in Open-Source enterprise server and storage solutions including Backup & Recovery to protect critical data.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.

CodeShield

CodeShield

CodeShield is a SaaS that helps software developers and security teams secure IAM in the public cloud. With us, you detect IAM privilege escalations easily and achieve least privilege.