News

2017-11-24

Oxford University’s Cyber Research

Oxford University's Centre for Technology and Global Affairs researches the impact of technology on international relations, government & society.

2017-11-27

Artificial Intelligence, Robotics & All Tomorrows Wars

An Experts Group on robotics and AI have sent a warning letter to the UN Convention on Certain Conventional Weapons. Is anyone listening?

2017-11-23

Robots Could Join The Ukrainian Conflict

Phantom: A Ukrainian military robot with multiple deadly weapons could soon be deployed agints Russian ground forces in Donetsk.

2017-11-20

AI: Experts Talk Ethical & Security Concerns

The future of artificial intelligence was a hot topic at the CYBERSEC Cybersecurity Forum, where security professionals discussed potential of AI.

2017-11-16

Unstructured Data: Threats You Cannot See

Structured data is only a small portion of a larger, more complicated puzzle. Security teams struggle to identify, collect & analyse unstructured data.

2017-12-04

Poor North Korea Is A Cyber Superpower

North Korea may be poor, but has proved its destructive powers and is successfully engaged in a full scale cyberwar with South Korea and the US.

2017-11-30

Where Should The Pentagon Focus In Cyberspace?

Playing Catch-Up: The US military is still working out its tactics, techniques, command structures and procedures for operations in cyberspace.

2017-11-24

US Ready To Fight Hybrid War By 2030

The US Army expects lethal attacks in multiple domains, land, sea, air, space and cyberspace, blurring the distinction between peace and war.

2017-11-21

Cyber Security Insurance

It used to be simple …If your employee stole cash from your business or forged a cheque, an insurance policy would cover it. Not any more.

2017-11-20

North Korean Cyber Gangs Blitz the Irish

North Korean state-sponsored cyber gangs are launching almost daily attacks on Irish companies, banks and utilities.

2017-11-28

Social Media & Crisis Management

Social media has the power to connect people instantly. For security managers, it's the most powerful tool for controlling information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Pindrop Security

Pindrop Security

Pindrop solutions are leading the way to the future of voice by establishing the standard for security, identity, and trust for every voice interaction.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Esentry

Esentry

Esentry systems is a managed security service provider with focus on continuous security monitoring, threat detection, threat analysis and cybersecurity compliance.