FREE TO VIEW


« Back to News

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-10

Can Small Business Beat Cyber Attacks?

A good cybersecurity strategy is essential for any business, no matter its size, but with the severe skills shortage, what’s a small business to do?

2019-12-09

AI And IoT Have Created The AIoT

The IoT creates vast connections, AI makes these devices come alive, creating AIoT networks of devices that can communicate and process data.

2019-12-09

Darktrace Wins Lloyds Award

British cybersecurity company Darktrace has won the prestigious Lloyds Bank Business award for its pioneering work using artificial intelligence.

2019-12-06

Creating A Cyber Incident Response Policy

Incident response is an organised approach to addressing and managing the aftermath of a security breach or cyberattack. You might need it.

2019-12-06

Beware Phishing Emails

Phishing is one of the most longstanding and dangerous methods of cybercrime. It is a simple fraud to operate and consistently claims victims.

2019-12-06

Free Speech And The Detention Of Julian Assange

Is Julian Assange a journalist and is journalism a crime? Yes and No, say those who oppose his extradition to the US on spying changes.

2019-12-05

Spyware Website Taken Down

Imminent Methods: A cyber crime website selling hacking tools and spyware has been closed down after an international investigation.

2019-12-04

The Kids Cyber Protection Code

Children start facing privacy risks as soon as they enter the digital environment, long before their media literacy prepares them to make decisions.

2019-12-04

Russia’s AI Mission Is State-Driven

Russia's recognition of the strategic significance of Artificial Intelligence is taking shape and it appears to be focusing on military applications.

2019-12-03

Cyber Security Skills Are On The Limit

The UK's widening cyber skills gap is putting the country's businesses at risk and is proving to be a huge concern for recruitment in the field.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

BlackBerry Cybersecurity

BlackBerry Cybersecurity

Blackberry provides intelligent security software and services to enterprises and governments around the world.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.