News

2019-05-14

Digital Techniques Drive Safety And Speed

Remote access technologies & robotics are eliminating human risk in hazardous heavy manufacturing and in designing training methods.

2019-05-14

Cybersecurity And IoT Suffering From The Skills Shortage

The growth of IoT is having an impact on the cybersecurity jobs market and organisations are increasingly turning to quick-fix solutions.

2019-05-13

Brexit Threatens Cybercrime Detection

British police say that speedy European evidence-sharing about cybercrime may be endangered by a no-deal Brexit.

2019-05-20

IoT Connected Devices Need Better Cybersecurity

Connected IoT Devices will soon be running artificial intelligence software to speed up image- and speech-processing tasks.

2019-05-15

High-Tech Enhanced Military Vision

The Enhanced Human: French researchers have created a lightweight contact lens offering augmented vision with a wireless visual relay.

2019-05-13

Has President Trump Lost The Cyber Plot?

The US Navy could be at risk of investing in conventional 'kinetic' force where it already predominates, at the expense of cyber weapons.

2019-05-13

US Electric Grid Suffers Unexplained DDoS Attack

Six weeks after the event the US DoE admits a major disruption to the electric grid involving a "denial of service condition" at an unnamed utility.

2019-05-13

What Can We Do About Increasing Complexity In Cybersecurity?

Cybersecurity has never been more complicated and only by holding our vendors, partners and ourselves fully accountable can we get protection.

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-09

Snowden Explains Why The CIA Is On Instagram

Edward Snowden has cast light on the reasons why the secretive US spy agency is emerging from the shadows and embracing social media.

2019-05-08

A Microphchip That Can Stop Cyber Attacks

The chip, called Morpheus, blocks potential attacks by encrypting and randomly reshuffling key bits of its own code and data 20 times per second.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Bob's Business

Bob's Business

Bob's Business adopts a fresh approach to information security awareness and compliance training, delivering key information through the use of short animated movies.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.

Atlantica Digital

Atlantica Digital

Atlantica design and create highly innovative software solutions and solid, scalable and secure IT infrastructures for a constantly evolving market.

FSP

FSP

FSP is a leading consultancy specialising in Digital, Security and AI solutions. We navigate the complexities of data sensitivity, confidentiality, governance and compliance.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.

Infratech

Infratech

Infratech is a leading Saudi company providing cutting-edge services and solutions in IT Infrastructure, IT Security and Digital Transformation.