News

2016-05-09

Cyber Revolution: A Big Step Change Business Leaders Need To Understand (£)

A revolution is taking place that compares to the Agricultural and the two earlier Industrial Revolutions and for many senior directors and strategic policy managers this has not yet been fully understood.

2016-05-10

Important IT Security Requirements For Business Leaders (£)

The implementation of cyber security skills and IT security departments have significantly increased in the last eighteen months and it has become an important issue that business directors and especially CEOs, Financial Directors and of course CIOs and IT Directors need to fully understand.

2016-05-09

US National Intelligence Director Says Snowden Hastened Encryption By 7 Years

James Clapper says Snowden has had an accelerator effect on commercially available encryption, making it much harder to track terrorists.

2016-05-09

Zuckerberg Thinks AI Will Know Everything About You.

Both Facebook and Google are pursuing machine learning technologies to take a deep look into what each user is posting, sharing & consuming

2016-05-09

Search It Yourself: Panama Papers Database Goes Public

The body behind the Panama Papers revelations makes an enormous database of financial data public today.

2016-05-09

Future Intelligence Sharing In the Syrian War

Integrated Intelligence: Fifteen years after 9/11, America's intelligence community finally has a rapid, modern sharing system.

2016-05-06

One Massive Hack Last Year - Nobody Noticed!

Hackers stole a database with the details of 57 million people.The breach was discovered only after the data was put up for sale on the dark web.

2016-05-06

E-stonia: Antithesis of Russia

Estonia's government wants to make it ‘impossible to do bad things’ on the Internet.

2016-05-06

US Spies Want A Laser Gun Bomb Detector

A hand-held, laser-based remote sensor to detect and identify chemical weapons, explosives, narcotics & biological agents from 100 feet away.

2016-05-04

Insurers Are Getting Smarter About Cyber Insurance

Could 2016 could be the year that insurance companies get more mature in how they underwrite cyber insurance policies?

2016-05-06

As the Snowden Leaks Began… There Was "fear and panic" in The US Government. There Still Is.

US Lawmakers are demanding that the Obama administration reveals how many Americans have been subject to domestic surveillance programs.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

it-sa 365

it-sa 365

it-sa 365 is a digital platform for connecting IT security vendors and experts with those who bear responsibility for IT security in management and technology.

BSA - The Software Alliance

BSA - The Software Alliance

BSA is the leading advocate for the global software industry before governments and in the international marketplace.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

N-able

N-able

N-Able deliver simple and sophisticated monitoring, security, and business solutions that empower you to solve your toughest IT challenges.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Radiant Security

Radiant Security

Radiant Security offers an AI-powered security co-pilot for Security Operations Centers (SOCs). Reinforce your SOC with an AI assistant.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.

Locket Cybersecurity

Locket Cybersecurity

Locket’s certified students provide pro-bono security audits for small and medium-sized businesses in the Chicagoland area.