News

2016-02-24

Know Your Enemy: The Most Popular Hacking Methods

The Easy Way: Outsiders want to become insiders with the least possible effort, and insiders help them do so - mostly accidentally.

2016-02-26

Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

Surprise: The US has engaged in "offensive cyber operations" against Russia.

2016-02-23

Israeli Cybertech Startups Set Trends

Cybertech 2016 in Tel Aviv showcased Israel's cybertech startups trying to make it big in the country's saturated tech startup ecosystem.

2016-02-26

Drones Could Fabricate Buildings Using 3D Printing

Swarms of unmanned aerial vehicles (UAV) will be able to print emergency shelters for survivors of natural disasters, buildings & large structures.

2016-02-24

All The Gadgets Coming To Your Next Car

The latest and greatest in new automotive gadgets include a sports car with it's own drone.

2016-02-24

The Big Three: N. Korea, ISIS and CyberWar

U.S. Director of National Intelligence James Clapper identifies three major threats to US security in 2016.

2016-02-24

The Sony Hackers Are Alive And Still Hacking

N. Korea? Vengeful ex- employees? Cyber criminals? One thing we know - they can't spell.

2016-02-24

AI Could Leave Half Of The World Unemployed

AI’s economic threat should not be understated. Machines could put half the world’s population out of a job in the next 30 years.

2016-02-23

Energy Utilities Highly Vulnerable To Cyber Attacks

IT professionals in the Energy & Utilities sectors are not not optimistic their organisations can detect & protect against damaging cyber attacks.

2016-02-23

Strategic Intelligence For The 21st Century.

Terrorism today is a widening series of global alliances assisted by social media and electronic propaganda. Opinion by Alfred Rolington

2016-02-23

FBI's War On Encryption Is Unnecessary

The data trails we voluntarily leave allow IOT devices and social media networks to track us in ways the government can easily access.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Salt Communications

Salt Communications

Salt communications is a global leader in secure communications. Our bespoke platform is the secure communications solution that uniquely gives complete control to our customers.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

CodeLock

CodeLock

Codelock is a patent-pending solution that continuously provides software security at the code level, while providing advanced management insights with performance metrics and data analytics.

Obscure Technologies

Obscure Technologies

Obscure Technologies is a firm of experts, specialised in brokering the best security solutions to market.

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.