FREE TO VIEW


« Back to News

2019-06-27

British Police Forensics Attacked

Half of the UK police's forensic data analysis capacity has been knocked out of action following a ransom attack on a major service supplier.

2019-06-27

A Cyber Toolkit For Small Business

Smaller companies need to put in place specific cyber protection solutions to guard against the significant risks of a data breach.

2019-06-27

The New Sophistication Of Nation-State Hacking

The experts at ESET find the Fancy Bears are showing off their sophisticated new toolkit for infecting networks and executing malicious code.

2019-06-26

The Human Cost Of Cyberwar

The Red Cross fear that the proliferation of cyber attacks on critical infrastructure will lead to mass casualties and want a detailed expert inquiry.

2019-06-26

Russia's National AI Strategy Takes Shape

In the global economic race to dominate the new digital economy its between the US tech giants and China. But President Putin has a plan.

2019-06-25

A New Age of Warfare

Cyber war operations are being conducted out of sight, classified, unattributed and increasingly beyond the control of political leaders.

2019-06-25

Cyber Criminals Have Created An Invisible Internet

Successful efforts by police to infiltrate dark net marketplaces are pushing criminal hackers to adopt more secure ways of communicating.

2019-06-24

Spies Use AI-Generated Faces To Connect With Targets

Fake Faces: A vast army of phantom profiles are lurking on LinkedIn, the popular website used for professional networking.

2019-06-24

Turning Amsterdam Into A Smart City

Intelligent Mobility: Amsterdam and MIT are working together using 16th Century technology to produce 21st Century solutions.

2019-06-24

Florida Municipality Suffers Cyber Extortion

Not So Smart Cities: The wave of ransom attacks on local government that began in Atlanta is being replicated in vulnerable small municipalities.

2019-06-21

Self-Driving Cars Are All About Surveillance

As self-driving car technologies develop, privacy and security concerns over how companies will use personal data are taking shape.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.

Operant Networks

Operant Networks

Operant Networks mission is to provide Operational Technology (OT) teams with solutions that simplify their increasingly complex worlds.

Right Hand Technology Group (RHTG)

Right Hand Technology Group (RHTG)

Right Hand Technology Group is a premier provider of IT services specializing in cybersecurity, managed IT solutions, and compliance.