FREE TO VIEW


« Back to News

2019-03-20

Knowing How Your Data Behaves Is The Key To Cybersecurity

Data is everywhere, however, securing that data has never been more critical, or more difficult. This means we need a new approach to security.

2019-03-20

Car Hacking & Data Collection

The amazing driver-assist mechanisms and must-have infotainment systems in many new cars are raising big concerns about safety and privacy.

2019-03-19

Triton Malware Is Spreading

A highly sophisticated form of industrial malware capable of remotely disabling safety systems with potentially catastrophic consequences.

2019-03-18

How To Develop Secure Cybersecurity Practices

Business leaders know that something needs to be done to limit their corporate risks and individual exposure and time isn’t on their side. Here's how.

2019-03-17

US Allies Don’t Agree With Trump Blocking Huawei

The Trump administration's push to block Chinese firm Huawei from their next-generation 5G wireless networks is facing skepticism in Europe.

2019-03-18

Knowledge For The Digital Age

4th Industrial Revolution: We are at the beginning of an electronic revolution that like earlier industrial revolutions will change our society.

2019-03-20

Banks Attacks Up Sixfold Last Year

The UK’s Financial sector reported 145 attacks in 2018 which was a substantial increase from 2017 when the reported data breaches were just 25.

2019-03-25

US Army Wants To Convert Tanks Into Autonomous Weapons

The US Army plan to build AI - directed tanks is'“another significant step towards lethal autonomous weapons.”

2019-03-19

Cybercrime Misconceptions Put Consumers At Risk

A third of British people surveyed incorrectly believe that public Wi-Fi has to, by law, have effective security. It gets worse.

2019-03-25

AI Will Not Replace Soldiers

Artificial Intelligence is poised to change the character of the future battlefield and the pace of threats faced in today’s security environment.

2019-03-19

National Security & Surveillance In The Age Of AI

GCHQ chief says the UK intelligence community needs to gain public trust regarding the use of Artificial Intelligence for national security purposes.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Zamna

Zamna

Zamna (formerly VChain Technology) is an award-winning software company building GDPR compliant identity platforms for the aviation industry.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Bradley-Morris

Bradley-Morris

Bradley-Morris is a leading recruiting firm specializing in transitioning military and veteran talent into civilian careers including Cybersecurity.

ContraForce

ContraForce

ContraForce is a threat detection and response software providing complete visibility across cloud, network, endpoints, user, and email with the ability to target and block threats in real-time.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Aegis Security

Aegis Security

Aegis Security helps clients to secure their systems against potential threats through pre-emptive measures, such as security assessments, and cutting-edge solutions to security challenges.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.