News

2018-08-08

Dixons Carphone Data Breach Hits 10m Users

A data breach at electronics retailer Dixons Carphone is almost ten times larger than the company first thought.

2018-08-31

Surveillance Cameras That Spot Your Personality Type

AI can be used to analyse biometric data, like subtle on-camera eye movement, to predict personality traits better than random guessing.

2018-08-31

What Are Deepfakes?

The Internet now mediates every aspect of our lives, and an inability to trust anything we see could lead to an "end of truth."

2018-08-23

Phone Calls, Texts Or Email - How Do Millennials Communicate?

The fundamentals of good communication don’t change between generations, but personal voice communications are slipping down the priority list.

2018-08-16

Balancing Security With Digital Transformation

How do companies keep up with the pace of technical innovation & competition while protecting their critical assets from security breaches?

2018-08-30

AI Driven Security Is Much More Than An Algorithm

Good data boosts AI's ability to make judgments, and this starts with baseline data about users, devices, network systems and workflow patterns.

2018-08-30

GDPR Means Revisiting Email Marketing

Business can no longer approach email marketing strategies casually. Under GDPR, you are required to be able to prove every user chose to sign up.

2018-08-30

Satellite Imagery + Social Media = A New Way To Spot Emerging Nuclear Threats

Hiding illicit nuclear programs might be getting harder, thanks to new ways of gleaning and combining clues from different rivers of digital data.

2018-08-07

Criminals Are Driving Australian Data Breaches

Criminal attacks accounted for the majority of data breaches reported to the Office of the Australian Information Commissioner in Q2 2018.

2018-08-29

Estonia’s Cyber Revenge

Estonia, the small EU nation that was the first target of state-sponsored cyber warfare from Russia, may soon be able to strike back.

2018-08-29

Bank Industry Is Turning On To AI Technology

The rapid growth of AI is due to increasing market competition, the need to reduce overheads plus the benefits of capturing large volumes of data.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Assure Technical

Assure Technical

Assure Technical offers a holistic approach to Technical Security. Our expertise and services span across the Physical, Cyber and Counter Surveillance domains.

Security Current

Security Current

Security Current's proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

Zymbit

Zymbit

Zymbit provides hardware security modules (HSM) for IoT devices, including Raspberry Pi and other single board computers.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Comparitech

Comparitech

Comparitech strives to promote cyber security and privacy for all. We are committed to providing detailed information to help our readers become more cyber secure and cyber aware.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.