News

2015-04-22

The Internet Connected Car

By 2020 BI Intelligence estimates that 75% of cars shipped globally will be connected.

2015-04-21

Planes Without Pilots

The Centaur Optionally Piloted Aircraft can be operated unmanned or with pilots on board.

2015-04-22

Wi-Fi on Planes is Vulnerable to Inflight Hacking

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi.

2015-04-17

Cloud-based Business Intelligence Goes Mainstream

More than 50 percent of businesses currently use or plan to use cloud-based business intelligence.

2015-04-17

Cybercrime More Profitable Than Drug Trading

Total Global Impact of Cybercrime is US$3 Trillion, making it more profitable than the global trade in marijuana, cocaine & heroin combined.

2015-04-16

Insurance Experts Say Adequate Cyber Cover Is Now Available.

Cyber insurance is becoming broader and more affordable, although it's worth shopping around for the right policy.

2015-04-14

French Media’s Emergency Meeting After Isis Hack

Crisis: All TV5Monde broadcasts were brought down in a blackout by hackers claiming allegiance to Isis.

2015-04-15

Snowden’s HBO Interview: Has He Actually Read The NSA Documents He Leaked?

Snowden tells HBO that he hadn’t thoroughly looked at the sensitive documents before leaking them, knowing they were “harmful”.

2015-04-08

US: Comcast Ultra-fast Internet by 2016

Internet speeds of up to 2 gigabits per second to the majority of its nearly 22 million subscribers.

2015-04-08

Are You Really Spending Enough on Security?

Many CIOs endanger their companies simply by not spending enough on security.

2015-04-15

Proactive Cyber Security Strategies Improve Security Effectiveness

New Research from Accenture & Ponemon Institute quantify success factors of companies that have improved their cyber security strategies.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute (WCRI)

Wolverhampton Cyber Research Institute builds on the strength of its members in the area of network and communication security, artificial intelligence, big data and cyber physical systems.

South West Cyber Resilience Centre (SWCRC)

South West Cyber Resilience Centre (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia.

Terra Quantum

Terra Quantum

Terra Quantum is a deep tech pioneer, developing revolutionary quantum applications to shape the technology of the future.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Athena7

Athena7

Athena7 is a dedicated assessment practice committed to helping organizations understand how their infrastructure, backups, and security controls will withstand the latest threat actor tactics.

Boldend

Boldend

Boldend offers leading-edge offensive and defensive cybersecurity solutions that empower government and commercial organizations to stay resilient in an evolving threat landscape.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.