FREE TO VIEW


« Back to News

2019-02-04

AI In Business: 2019 Trends & Predictions

While robots will be taking over the workplace, some experts are predicting that it will actually improve and create new jobs for people.

2019-02-01

Geo-Political Tensions Are Fuelling Cyber Attacks

Carbon Black's latest Threat Report reveals just how sophisticated attackers have become in evolving to remain undetected.

2019-02-01

Hackers Use PayPal To Go Phishing

Double Jeopardy: Ransom victims are prompted to follow a link to a fake PayPal phishing page, where their login credentials are stolen.

2019-01-31

Cyber Criminals Are Aiming At Business

Last year was the time when cybercriminals definitely realised businesses are juicier targets than individuals.

2019-01-31

US Intelligence Chief Warns Of ‘ever more diverse’ Threats

The US "faces an increasingly complex and uncertain world in which threats are becoming ever more diverse and interconnected."

2019-01-30

Denmark's Maritime Cybersecurity Plan Highlights Financial Threats

Denmark's cybersecurity strategy classifies financial threats to the maritime sector from cyber criminals 'very high' compared to terrorist threats.

2019-01-30

Financial Executives Are Out Of Touch With Cyber Threats

Executives in the financial services sector are complacent about the impact of new technology on the security and stability of their industry.

2019-01-30

How Blockchain Technology Can Improve US Infrastructure

US infrastructure is often described as crumbling, broken-down, and out-of-date. Blockchain could transform investment in its renewal.

2019-01-29

Europe’s Most Hackable Election

Three years after Russian disinformation disrupted the 2016 US presidential election, the EU faces big risks as it gears up for a vote in May.

2019-01-29

Connecting African IT & Software Developers With Top Tech Companies

Worldwide demand for IT and software engineers far exceeds supply and Andela is helping businesses overcome the technologist shortage.

2019-01-29

Millions Of Secret Bank Records Leak Online

A server security lapse at a Texas data & analytics company for the financial industry has left information on 24 million documents exposed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Assertion

Assertion

Assertion secures your collaboration (UC/CC) systems from cyber risks. Enforcing the right set of controls and monitoring them continually brings down risk to acceptable levels.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.

AZCOMP Technologies

AZCOMP Technologies

AZCOMP provide professional network security consulting services as well as network security auditing and assessments.