FREE TO VIEW


« Back to News

2019-01-22

AI Will Find You In The Crowd

Neural network researchers say artificial intelligence can detect and identify individuals without facial recognition.

2019-01-22

Singapore Upgrades Cybersecurity

Singapore wants a new model of national cyber defence across 11 critical infrastructure sectors, including healthcare, energy, telecoms & transport.

2019-01-22

World Economic Forum Cyber Risks Report

WEF 2019 examines “what-if” Future Shocks in quantum computing, weather manipulation, monetary populism and emotionally responsive AI.

2019-01-21

Shutdown Is Doing Lasting Damage To US National Security

Halting cybersecurity work makes it easier for hostile nation-states to steal Americans’ personal information and corporate intellectual property.

2019-01-21

Zimbabwe Orders Internet Disconnected

The government in Zimbabwe has responded to widespread protests over rising fuel prices by cutting off the nation's wireless & internet services.

2019-01-18

Vietnam Says Facebook Is Acting Illegally

Vietnam has accused Facebook of violating a new cybersecurity law by refusing to remove anti-government content from its site.

2019-01-21

The Impact Of Tech Disruption On Jobs

If the robots can replace us, what are we left to do? Deloitte has looked at how the nature of work is shifting with automation.

2019-01-16

Quantum Computing Will Overtake Conventional Computing

Conventional computers are reaching their limit. Quantum computers, which calculate using quantum phenomena are the replacement.

2019-01-18

Global Cyber Attacks Up 63% Driven By AI

Significant growth in cyber attacks is driven by the increasing use of artificial intelligence by organised criminal groups.

2019-01-21

Google Search Results Spoofed To Create Fake News

A spoofing technique that creates fake Google search results could be used in political influence campaigns or for other subversive purposes.

2019-01-21

US Vs. China - A Different Kind of Cyberwar

China is engaged in its own form of cyberwarfare, but one that does not readily fit into the West’s long-standing perceptions of war and peace.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DriveLock

DriveLock

Our security solution is designed to prevent external attacks, which are evermore sophisticated as well as monitor, document and even prevent internal incidents.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

Maritime Transportation System Information Sharing and Analysis Center (MTS-ISAC)

MTS-ISAC promotes and facilitates maritime cybersecurity information sharing, awareness, training, and collaboration efforts between private and public sector stakeholders.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Darkstrike / Qeros

Darkstrike / Qeros

Complete your defense in-depth strategy with Darkstrike, the world’s most advanced quantum-secure and ransomware-proof data platform for any use case, ensuring unconditional data security.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.