FREE TO VIEW


« Back to News

2020-08-24

Satellite Communications Need Protection

If hackers can intercept a satellite's signals, it is possible they can invade an organisation’s entire network by infiltrating its ground station.

2020-08-24

Industrial Robots Are Not Safe From Cyber Attack

Similar to remote working humans, when they are incorrectly set up and poorly secured, industrial robots can be a source of major security issues.

2020-08-24

Hackers Attack Israel’s Defence Sector

Suspected N.Korean hackers use LinkedIn to deliver fake job offers, aiming to infiltrate defense networks and steal sensitive security information.

2020-08-21

Remote Working Has Real Cyber Security Risks

Remote workers are highly vulnerable to cyber criminals during lockdown, but this could be just the push needed to transform cyber security.

2020-08-19

Identity Theft - A Very Personal Hacking Attack

Recently, a US Woman was hacked and her personal data held to ransom. She contacted us to tell her story and agreed that we tell it to you here.

2020-08-19

Cyber Crime Is Growing Very Fast Due To Coronavirus

An Interpol assessment of the impact of Covid-19 on cyber crime shows a significant change of focus to business and major corporations.

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

2020-08-18

Cyber Security Technology Sponsors Formula 1

Crowdstrike, Darktrace, Kaspersky & Thales are all piling in to F1 motor racing, promoting cutting-edge cyber security technology to global markets.

2020-08-18

Seven Cyber Security Questions Businesses Need To Ask Themselves

The British National Cyber Security Centre is offering technical advice on cyber insurance for businesses in the form of seven questions.

2020-08-18

Chinese Hackers Aim To Plunder Taiwan's Semiconductor Industry

Advanced semiconductor chips are vital for the IoT and 5G telecoms. Making them is Taiwan's strategic industry and China wants their secrets.

2020-08-18

Teacher Estimates Replace Algorithm That Reduced Exam Grades

It turned out to be a drastic mistake to allow high school students' critical examination results to be graded by Artificial Intelligence.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Rubicon Workflow Solutions

Rubicon Workflow Solutions

Rubicon is a leading provider of managed IT support and strategic services, specialising in creative and mixed platform environments.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

NESEC

NESEC

NESEC is a specialist in information security consulting services and solutions.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Founder Shield

Founder Shield

Founder Shield is a data driven insurance brokerage focused excusively on rapidly evolving high-growth companies.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

ConvergePoint

ConvergePoint

ConvergePoint is the leading compliance software provider on the Microsoft Office 365 SharePoint platform.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

AVIANET

AVIANET

AVIANET's goal is to empower enterprises and corporations worldwide and manage their digital transformation journey with confidence.