News

2016-11-29

US Election Recounts In ‘Hacked’ States?

Hacking The Vote: Calls for a ballot recount in three critical swing states renew concerns over possible US electoral interference.

2016-11-28

Five Things AI Can Do Better Than Humans

Apart from boardgames, what else is Artificial Intelligence good for? Here are five tasks for AI in which it can equal, or surpass, humans.

2016-11-28

Misinformation & Cyber Attacks During Montenegro Elections

Possible vectors for a foreign power to influence elections in an EU membership candidate country.

2016-11-28

Google Technology To Treat UK Health Service Patients

London's Royal Free NHS hospital trust has teamed up with Google to share patient data using Deep Mind computing power.

2016-11-28

Has Cognitive Computing Arrived?

Cognitive computing has the potential to transform the way we view data analytics.

2016-11-28

Facebook Will Double UK Employees

Facebook will expand its presence in the UK by 50% when it opens its new London headquarters in 2017, the US technology giant has announced.

2016-11-25

The British IP Bill & Protection From Government Snoopers

The UK Investigatory Powers Act, aka 'the snoopers charter' passes in to law in December. It basically removes your right to online privacy.

2016-11-22

Google & Facebook Ban Fake News Sites

It's too late now: Google and Facebook are taking steps to control fake news by closing down access to their advertising networks.

2016-11-22

Spies Use Tinder

Surveillance and infiltration are not new tactics and collecting data from social media shows how the internet is bringing it all to a whole new level.

2016-11-22

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack

Data breaches are very costly. Organisations should consider three basic steps to ensure they are prepared to remedy a future breach.

2016-11-21

Social Media & The New Advertising Model (£)

Too Big To Ignore: Engaging with social media is now crucially important for all businesses that want to connect with the new audience.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

Deepwatch

Deepwatch

The Deepwatch Platform helps organizations reduce risk through early and precise threat detection and remediation.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

Bastion Networks

Bastion Networks

Bastion are a security-focussed managed solution provider and consultancy. We work with advanced cyber security vendors to produce managed security solutions to protect from online threats.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Obviam

Obviam

Obviam specialize in providing security solutions tailored to meet the unique needs of each of our clients, no matter where they are in their security journey.

BreachRx

BreachRx

BreachRx is the first intelligent incident response management platform that provides operational resilience for the entire enterprise.