FREE TO VIEW


« Back to News

2021-10-22

Top Nine Technology Trends Of 2021

The technology industry is evolving fast and keeps improving every passing day. Here are some of the latest technology trends to be aware of.

2021-10-25

Israeli Hospital Attacked With Ransomware

Israel's hospitals have been advised to print out patients’ medical files to ensure operational continuity in case of further attacks.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-10-25

Google Creates Its Cyber Security Action Team

Team Mission: "supporting the security and digital transformation of governments, critical infrastructure, enterprises & small businesses".

2021-10-25

US Cyber Security ‘Kindergarten’ Compared To China

Pentagon CSO Quits: China is heading towards global dominance in AI due to the relatively slow pace of innovation in the United States. 

2021-10-22

Making Sure Your Business Is Cyber Smart

Being cyber smart this Cybersecurity Awareness Month is certainly achievable, but it requires investment of both time and money.

2021-10-20

New Report: Average SIEM Deployment Is Over 6 Months

Real Time: Security Information and Event Management Software (SIEM) allows security teams to keep on top of security alerts as they happen.

2021-10-20

Protecting Your Business Data Using Fake Information

Convincing Decoy: An algorithm can frustrate phishing attacks by generating fake versions of every document that organisations need to protect.

2021-10-15

International Effort To Reduce Ransomware Attacks

The US Government is putting together a 30-country meeting to try and improve the global response to ransomware attacks.

2021-10-19

British National Cyber Force Campus

Cyber threats from criminals, terrorists and hostile states will include officers selected from MI6, GCHQ and the military under unified command.

2021-10-19

Indian Cyber Security Firm Linked To Spyware

Amnesty International has found evidence of espionage against one African political activist with spyware widely deployed in many Asian countries.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

Bottomline Technologies

Bottomline Technologies

Bottomline Technologies is an innovator in business payment automation technology, helping companies make complex business payments simple, smart and secure.

Chainalysis

Chainalysis

Chainalysis provides blockchain analysis software to prevent, detect and investigate cryptocurrency money laundering, fraud and compliance violations.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

ETSI

ETSI

ETSI is a European Standards Organization dealing with telecommunications, broadcasting and other electronic communications networks and services including cybersecurity.

AlertEnterprise

AlertEnterprise

AlertEnterprise uniquely eliminates silos and uncovers blended threats across IT Security, Physical Access Controls and Industrial Control Systems.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.