FREE TO VIEW


« Back to News

2021-07-21

Russian National Security Strategy

The new strategy aims to promote Russian digital sovereignty and to counter the threat of foreign and domestic subversion with information warfare.

2021-07-20

Artificial Intelligence Is Being Badly Used In Cyber Security

With many more enterprises using AI technology, it’s time to analyse the possible negative impacts of AI's implementation in cyber security.

2021-07-20

SMEs Need To Close The Cyber Security Training Gap

Companies are struggling to get employees to take security measures for remote working and cannot hire the skilled people to put security in place.

2021-07-19

Scientists Say Social Media Is A Risk To Humanity

Social media has completely changed the way we communicate and the collective behavioral effects of new technology on humans can be destructive.

2021-07-19

Ransomware Gang REvil Is Cancelled

The strange disappearance of the public-facing websites affiliated with Russia-linked REvil follows shortly after a string of big ransomware incidents.

2021-07-19

Autonomous Ships And Cyber Security

Maritime Autonomy: Unmanned surface ships are becoming more independent and capable of accomplishing sophisticated missions.

2021-07-19

IISS: Cyber Capabilities & National Power Rankings

Cyber capability underpins military power and can radically affect national decision-making. Currently the US has superiority over numerous contenders.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

2021-07-16

Microsoft Buys RiskIQ

RiskIQ offers threat intelligence & cloud-based software used by 30% of the Fortune 500 and more than 6,000 organisations around the world.

2021-07-16

How B2B Companies Can Use Cyber Security For Data Protection

For optimum data protection, actionable intelligence needs to be followed up with robust cyber security solutions. By Lidia Hovhan

Perimeter 81

Directory of Suppliers

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Northwave

Northwave

Northwave is 100% focused on providing integrated high quality information security services.

Crypteia Networks

Crypteia Networks

Crypteia Networks delivers a patent-pending technology that identifies zero-day threats along with misconfigurations on already deployed defenses.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

CyFrica

CyFrica

CyFrica conference gathers IT and cyber security leaders from across the African sub-continent with a focus on ‘creating a cyber safe Africa’.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.