FREE TO VIEW


« Back to News

2020-03-13

Coronavirus And Your Phone

If you haven't cleaned your phone in a while, think twice before holding it up to your face the next time you have a phone call.

2020-03-09

Why 5G Technology Is A Geopolitical Issue

Innovative use of software across 5G platforms raises problems, as the technology serves to widen the attack surface of the network.

2020-03-06

The US & Britain Edge Closer To An Agreement On Huawei

Britain has conceded to US pressure and is about to agree more strict limitations on Huawei’s presence in its 5G mobile telecom infrastructure.

2020-03-03

Boot Camp Lessons In Cyber Security

Northumbria University has teamed up with two leading cyber security organisations to run a training event for computer science teachers.

2020-03-23

Business Must Avoid Cyber Complacency

Across every industry, every country and every size of business, one thing is certain: the threat from cyber attacks is growing every day.

2020-03-21

Can AI Replace Your Job?

The capability of artificially intelligent systems to replace much of modern manual labour is looking like a credible near-future possibility.

2020-03-19

Cyber Criminals Target UK Motorists

The British Driver & Vehicle Licensing Agency (DVLA) warn of a 20% year-on-year surge in attempted online fraud targeting motorists.

2020-03-11

Facial Recognition Company Hacked

Clearview, who use cutting edge facial recognition software which has recorded over 3 billion personal images, has suffered a major breach.

2020-03-19

The Hot Jobs In Cyber Security & How To Get One

In a comparatively new career path, it is already clear that the hot jobs in cyber security are linked with a demand for analytical skills.

2020-03-18

An Escalating Cyber-Espionage Campaign In The Middle East

Governmental organisations in Turkey, Jordan and Iraq are being targeted in a growing campaign to gather intelligence. Who would do that?

2020-03-03

Where Is Iran's Cyber Response To It's General's Assassination?

Iran's threatened response to the US killing of their top military leader has yes to materialise, although their state- sponsored hackers are busy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

CERT-In

CERT-In

CERT-In is a functional organisation of the Ministry of Information & Electronics Technology, Government of India, with the objective of securing Indian cyber space.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Zynap

Zynap

Zynap is an Advanced AI-powered SaaS platform replicating cybercriminal tactics to predict, detect, and neutralize threats before they strike.