FREE TO VIEW


« Back to News

2019-01-28

The Future Of War is Cyber

In future, most wars will be waged via computers, servers and digital weapons. Is the United States really prepared for what is coming?

2019-01-25

Disinformation: Facebook Shuts Hundreds Of Russia-Linked Accounts

Facebook has shut down 75 accounts, closing 289 pages, representing 790,000 followers, due to "coordinated inauthentic behavior".

2019-01-25

Australian Defence Chief Issues Cybercrime Warning

Australia's military chief has warned European officials of the ever-present threat posed by cyber espionage and intellectual property theft.

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-02-19

Utility Week Cyber Security & Resilience Conference

12 March 2019 | London. The only UK event bringing together resilience, risk, cyber & IT security executives from the utility sector.

2019-01-24

The Age Of Surveillance Capitalism Dawns

“Surveillance capitalism” works by providing free services that people use, enabling the providers to monitor user behaviour in astonishing detail.

2019-01-24

GCHQ Introduces Women Only Cybersecurity Training

GCHQ thinks the lack of women in cybersecurity is part of the bigger picture of a gender imbalance in science, technology, engineering and maths.

2019-01-23

What Financial Services Executives Need to Know About Data-Security

The financial services industry experiences 35% of data breaches, earning it the unflattering title of the most-breached sector. With good reason.

2019-01-23

The US Pentagon Has Numerous Security Gaps

The US Defense Department’s IT systems have 200+ vulnerabilities that put the Pentagon at risk of hacks and data theft.

2019-01-23

New British Cyber Security Centre

The National Digital Exploitation Centre (NDEC) will be the first R&D facility of its kind in Wales, providing a service to SMEs and microbusiness.

2019-01-22

Blockchain Applications For Identity Verification

Blockchain's fundamental capacity to reconcile and keep a record of transactions has potential to carve out a niche in identity management.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Navaio IT Security

Navaio IT Security

Navaio helps clients with IT Security related challenges with a primary focus on Identity and Access Management, Data Governance, User Awareness and Cyber Resilience Services.

HARMAN International

HARMAN International

HARMAN designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

DeepSurface Security

DeepSurface Security

DeepSurface is the first risk-based vulnerability management platform that allows cybersecurity teams to automate the process of analyzing and prioritizing vulnerabilities.