News

2016-06-14

Now You See It: AI Will Become Invisible

In the near future, artificial intelligence will commonly become intangible, indistinguishable and incomprehensible for humans.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

Spying With Nano Robots Disguised As Insects

Spy technology emulates nature to develop successful controlled flight of a biologically inspired, insect-scale robot.

2016-06-13

Connected: The Mobile Police Station

Police in Spain are testing a vehicle equipped with technology that converts a patrol car into a real mobile police station.

2016-06-13

MI5's Uncontrolled Bulk Data Collection

MI5 has escaped regular scrutiny of its bulk collection of communications data, according to newly released confidential correspondence.

2016-06-13

First LinkedIn, Now Twitter ... Hacked User IDs For Sale

Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web.

2016-06-09

The FBI Is Looking For A Fight Over Encryption

After the public dispute with Apple over iPhone access the FBI is now bracing for a battle involving encrypted text messages, e-mails & other data.

2016-06-08

12% Of Bank CEOs Don’t Even Know If They’ve Been Hacked

KPMG say there is a clear disconnect between how the C-Suite views cyber security versus the next tier of executives.

2016-06-09

Less Than a Quarter of Businesses Are Ready To Resist A Cyberattack

On average, only 23% of organizations are capable of responding effectively to a cyber-incident.

2016-06-10

NSA Has ‘No Idea’ How Many American Citizens It’s Spying On

The NSA monitors the electronic communications of millions of people to find foreign threats. How many US citizens are caught up ?

2016-06-08

Modern Fiction: A Novel Is Required Reading At The Pentagon

Ghost Fleet, a novel about a future world war pitting China and Russia against a complacent United States, is required reading for the US Military.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Inpher

Inpher

Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning while keeping data private, secure, and distributed.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Abertay cyberQuarter

Abertay cyberQuarter

The Abertay cyberQuarter is a cybersecurity research and development centre housed within Abertay University.

Omantel Innovation Labs

Omantel Innovation Labs

The Omantel Innovation Labs is a platform to enable startups and innovators to develop and commercialize solutions within selected technology verticals including cybersecurity.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

Telarus

Telarus

Telarus is a Technology Services Brokerage that holds contracts with the world's leading cloud voice, contact center, cybersecurity, mobility and IoT providers.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.

Canary Technology Solutions (Canary IT)

Canary Technology Solutions (Canary IT)

A Cloud, Cyber Security, Retail Solutions and Managed IT Services provider for over 25 years, we safeguard and revolutionise business through technology and foresight.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.