News

2017-11-22

MI5 In The Clear Over Terror Attacks

An independent review clears MI5 & police of making mistakes that allowed terrorists to strike Britain and recommends a 'terror-spotting' algorithm.

2017-11-22

A Response Solution to Cyber Attacks

Verint has a cyber security solution designed for customers with large security operations centre which uses data mining software.

2017-11-25

Management Coverup At Uber After 57m Customers Hacked

Showing a remarkable lack of integrity, Uber kept the massive data breach secret for more than a year after paying off the hackers to be quiet.

2017-11-21

Computers Say ‘No’ But AI’s Decisions Must Be Fair & Transparent

Researchers have documented a long list of AIs that make bad decisions because of coding mistakes or ingrained biases in the training data.

2017-11-21

N. Korean Hackers Plan to Devastate UK

Hacking groups linked to North Korea will continue to devastate the UK with major cyberattacks says former GCHQ Director Robert Hannigan.

2017-11-21

When Guns And AI Work Together

As with smart lamps, TV and smart cars, AI technology is making guns a lot more intelligent.

2017-11-20

Russian Fake Brexit Tweets & Attacks On The UK

The National Cyber Security Centre publicly confirms that Russia has made cyber attacks on major UK energy, technology & media companies.

2017-11-17

DDoS Attack? There Is An App For That.

Security expert Brian Krebs tells the story of Ragebooter, a Denial of Service App that is readily available to Android users.

2017-11-16

The Current State of Cyber Warfare

The defence apparatus has an indispensable role in national cybersecurity but it should be under close democratic control. By Lior Tabansky.

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-11-14

5 Cyber Threats Executives Should Understand

Protecting highly elastic network environments presents business leaders & cybersecurity managers with a complex array of security challenges.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

Cloud53

Cloud53

Clolud53 is a Manchester based Managed Cyber Security & Cloud company providing solutions focused around you.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

RIT Global Cybersecurity Institute

RIT Global Cybersecurity Institute

At RIT's Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

Gibbs Consulting

Gibbs Consulting

Gibbs Consulting provides innovative, flexible, on-demand IT Services and IT Consulting that delivers value and successful outcomes for our clients.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.