FREE TO VIEW


« Back to News

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-09

Snowden Explains Why The CIA Is On Instagram

Edward Snowden has cast light on the reasons why the secretive US spy agency is emerging from the shadows and embracing social media.

2019-05-08

A Microphchip That Can Stop Cyber Attacks

The chip, called Morpheus, blocks potential attacks by encrypting and randomly reshuffling key bits of its own code and data 20 times per second.

2019-05-08

Using Identity Access Management

Identity Access Management is a key element of modern cybersecurity strategy, So why then, aren’t more companies using it?

2019-05-08

Mossad Needs Cyber Experts

Israel's national intelligence agency, known as Mossad, is looking for more highly- trained experts for its operational arm.

2019-05-08

Engaging With Cybersecurity

Cyber attacks are an existential threat to business and companies face a challenge in getting employees on board with good security practice.

2019-05-08

AI And The Future Of Warfare

The Pentagon's strategic thinkers would like AI to help human analysis, not replace it. But how will humans interact with AI and robots?

2019-05-07

How Algorithms Are Being Used

From screening job applicants to analysing demographic data, optimised algorithms are playing an increasing part in human interactions.

2019-05-07

Cybercrime Cost US Business $2.7B In 2018

The FBI's report on cybercrime shows the most costly issues involved business email breaches, confidence fraud & investment scams.

2019-05-07

Five Eyes Intelligence Chiefs Point The Finger

International Intelligence Chiefs agree that attributing blame for attacks by nation-state hackers can improve security awareness.

2019-05-07

AI Will Shape The Future 6G Network

6G will be an enormous step up from 5G and AI will become the enabling force behind a whole new generation of machine intelligence applications.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Telos

Telos

Telos offers cybersecurity solutions and services that empower and protect the world’s most security-conscious enterprises.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Worksent Technologies

Worksent Technologies

Worksent is a Trusted white-label offshore support partner for MSPs and MSSPs.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.

NST Cyber

NST Cyber

NST Cyber provides comprehensive Threat Exposure Management to Global banks and Forbes 2000 companies.

Securitum

Securitum

Securitum is a leading penetration testing company in central and eastern Europe.