News

2016-11-29

Internet of Things – For Smart and Secure Cities

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.

2016-11-21

Snowden 2.0: Its Déjà Vu All Over Again At The NSA

Following a secret arrest, the NSA has now confirmed that another one of its subcontractors is charged with having stolen confidential data.

2016-11-16

Artificial Intelligence & Machine Learning Market To Grow Fivefold By 2020

IBM say the cognitive systems market is worth $8 billion in 2016. Including AI and machine learning, this is forecast to grow to $47 billion by 2020.

2016-11-01

CyberXchange Conference 2016

West Africa’s premier information security conference is held at the Landmark Event Centre, Lekki Lagos Nigeria, from November 2nd & 3rd

2016-11-16

Internet of Things: 2017 Predictions

Experts are beginning to recognise that the IoT's potential to fuel business growth is accompanied by multifaceted complexity.

2016-11-16

Cant Be Bothered: Non-Security Policy Used By 90% Of Workers

Most workers put convenience ahead of security policies, with 90% of them admitting to ignoring them when they feel they need to.

2016-11-14

Cyber Attack Takes Liberia’s Entire Internet Down

A cyber-attack knocked Liberia’s Internet offline, as hackers targeted the nation’s infrastructure using a mass DDOS technique.

2016-11-15

Jason Bourne: Envisioning A ‘frightening’ Cyberwar

Fact Or Fiction: Bourne's author “extrapolating” from his new thriller a “frightening” scenario of cyberwarfare that could inflict the real world.

2016-11-14

Company Directors Should Have Personal Liability For Data Breaches

The UK's Information Commissioner recommends government should hold company directors personally accountable for for data breaches.

2016-11-18

Self-drive Vehicles – A New Reality

There’s a powerful force behind the development of autonomous-vehicle technology. Armies around the world.

2016-11-18

Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS

Hacktivist collective Anonymous cannot agree on strategy or tactics in it's self-appointed task of tackling IS Cyber Jihad.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IS Decisions

IS Decisions

IS Decisions builds affordable and easy-to-use Access Management software solutions, allowing IT teams to effectively secure access to Active Directory infrastructures, SaaS apps and data within.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

ANSEC IA

ANSEC IA

ANSEC is a consultancy practice providing independent Information Assurance and IT Security focussed services to customers throughout the UK, Ireland and internationally.

Camel Secure - ZeroRisk

Camel Secure - ZeroRisk

Camel Secure is a company specialized in the development of products for information security and technology risk management.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Anch.AI

Anch.AI

Anch.AI is an Ethical AI Governance platform that helps you comply with EU regulations and avoid risks and penalties when developing and using AI as part of your business.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.