FREE TO VIEW


« Back to News

2020-03-17

Why 5G Is Going To Quickly Replace 4G

5G will unlock new applications that were simply not possible with 4G. Specifically, workplaces will no longer be defined by a physical location.

2020-03-06

Ransomware Attack On US Power Station

A major cyber-attack has hit a US gas compression facility, forcing it to shut it down for two days as it struggled to recover.

2020-03-03

Mexico’s Economy Ministry Falls Under Attack

Following damaging attacks on the banking system and the oil industry, the Mexican Government now finds itself a target for hackers.

2020-03-02

The Pope Speaks Out On The Ethics Of AI

The Vatican, the European Union and some of the most important technology companies agree that Artificial Intelligence needs an ethical dimension.

2020-03-02

Top Cybersecurity Threats & Solutions To Empower Every Business

It’s high time for businesses to get serious about cybersecurity and protect assets and clients. By Naomi Hodges of Surfshark

2020-03-19

Business Has Increased Cyber Security But Lacks Cyber Training

Buying equipment & services is easy. Taking the time to train people to implement secure processes and a risk-aware culture is harder.

2020-03-16

Iran's Cutting Edge Cyberwar Capabilities

Iran has the skills to conduct attacks against its enemies across numerous sectors, including energy, financial services & critical infrastructure.

2020-03-13

UK Government: Mobile Devices Lost & Stolen

British government employees lost 1,474 devices in 12 months, 347 were reported stolen and 183 were either lost or stolen. Many were unencrypted.

2020-03-13

The Most Common Cyber Attacks

Over 32% of UK businesses identified an attack over last 12 months and 22% of charities reported they were attacked over the same period.

2020-03-12

Cyber Security Strategy In The Digital Age

The security posture of a company is now just as important to the CEO as it is to the CISO. Business leaders must embrace this reality.

2020-03-12

5G Will Affect Jobs In 2020

5G technology will change aspects of how we work and IT technology and business executives alike must adapt to the impact on the workplace.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

National Cybersecurity and Communications Integration Center (NCCIC) - USA

National Cybersecurity and Communications Integration Center (NCCIC) - USA

NCCIC is a cyber situational awareness, incident response, and management center for the US Government, intelligence community, and law enforcement.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

NanoVMs

NanoVMs

NanoVMs is the industry's only unikernel platform available today. NanoVMs runs your applications as secure, isolated virtual machines faster than bare metal installs.

ScorpionShield

ScorpionShield

ScorpionShield CyberSecurity is an EC-Council Accredited Training Center, and an On-Demand Service for Cybersecurity professionals.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.