News

2021-07-27

Power Generation Systems Need Blockchain Security

The increasingly complex interaction among different power systems calls for a secure, efficient and robust cyber infrastructure using blockchain.

2021-07-27

Data Privacy Is Key To The Technology Battle With China

The US wants to establish international privacy-protection standards to counter the proliferation of powerful new technologies dominated by China.

2021-07-27

Security Orchestration Can Help Business SOAR

Companies should adopt a unified cyber strategy across architecture, M&A and regulatory compliance, to reduce their risks. By Colin Tankard

2021-07-26

The Semiconductor Shortage Is Causing Cyber Security Problems

The global shortage of semiconductors increases the risk of the use of counterfeit parts with serious implications for data loss and IP theft.

2021-07-26

Military Intelligence: British Army Operation Using AI

British armed forces will increasingly use AI to predict adversaries’ behaviour, reconnaissance and relay real-time intelligence from the battlefield.

2021-07-24

The State Of Cyber Security In Healthcare

2021 Horizon: Cyber criminals persist in their attacks on providers, health plans and business associates, compromising sensitive patient data.

2021-07-24

Heads Of State On NSO Spyware List

French President Emmanuel Macron leads a list of 14 heads of state targeted for hacking by clients of the Israeli mobile spyware firm NSO Group.

2021-07-22

IBM Watson In Demand

IBM Watson's 'AI-for-Hire' service is poised to grow 30%, driven by Healthcare and Financial Services customers looking for real time data processing.

2021-07-22

Politicians Are Ignorant Of Cyber Security

Britain has very high cyber security skills and its spy agencies have great technical expertise, but its political leaders are not up to speed.

2021-07-21

Russian National Security Strategy

The new strategy aims to promote Russian digital sovereignty and to counter the threat of foreign and domestic subversion with information warfare.

2021-07-20

Artificial Intelligence Is Being Badly Used In Cyber Security

With many more enterprises using AI technology, it’s time to analyse the possible negative impacts of AI's implementation in cyber security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Digital Ship

Digital Ship

Digital Ship provides news, information, conferences and events focused on digital ship systems, information technology and security relating to maritime operations.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

CyGlass

CyGlass

CyGlass simply and effectively identifies, detects, and responds to threats to your network without requiring any additional hardware, software, or people.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

CIBR Warriors

CIBR Warriors

CIBR Warriors are a leading cyber security and networking staffing company that provides workforce solutions with businesses nationwide in the USA.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Nuance Communications

Nuance Communications

From revolutionizing the doctor-patient relationship to reinventing the way brands connect with their customers, Nuance technology helps organizations push the boundaries of what’s possible.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.