FREE TO VIEW


« Back to News

2019-07-22

E-Fusion And Industry 4.0

Industry 4.0 is driven by a technological fusion that is blurring the lines between the physical, digital & biological spheres. By Alfred Rolington

2019-07-22

AI Could Transform Submarine Warfare

Applying AI to ocean data helps submarine crews understand where their adversaries are, what they’re doing and what they can see.

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

2019-07-22

Ten Reasons Why Senior Managers Need To Understand Cyber Security

Effective cyber security leadership requires the same skills and intellectual processes called for to lead organisations at the highest level.

2019-07-23

Five Hi -Tech Ways To Fight Off Cyber Attackers

A shift towards a tech-centric culture means people are at a much higher risk of cyber-attacks. Here are five innovative ways to stay secure.

2019-07-18

Air Travel Needs Stronger Cyber Security

Air transport faces unprecedented risks from cybercrime, the result of digital transformation and extensive reliance on communication technologies.

2019-07-18

Most Cyber Insurance Claims Result from Human Error

About three-quarters of cyber claims notified in 2018 to Canadian insurers involved some kind of “easily preventable” human error.

2019-07-18

Professionals Say Network Security is Getting Harder

In a survey, 64% of security professionals said network security is getting harder; a fifth of all respondents said it is getting much harder.

2019-07-17

US Cyber Strike On Iran Is A Step Change

A military action was diverted into a cyber action: Modern warfare could increasingly look like a loss of connectivity, rather than a loss of life.

2019-07-17

The Cyber Effects Of Industry 4.0 On Warfare

We are experiencing the next Industrial revolution and the effects are changing geo-politics, military tactics & warfare. By Alfred Rolington

2019-07-16

AI Solves Beatles Songwriting Dispute

Was it John Lennon or Paul McCartney? An algorithm has learned to read musical fingerprints to help resolve arguments over a song’s origins.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

Switchfast Technologies

Switchfast Technologies

Switchfast Technologies is an IT consulting and managed services provider, offering IT support and consulting to Chicagoland small businesses.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Avanade

Avanade

Avanade is a leading provider of innovative digital, cloud and advisory services, industry solutions and design-led experiences across the Microsoft ecosystem.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.