FREE TO VIEW


« Back to News

2018-12-17

AI Will Solve Marketing Problems

When it comes to marketing, AI has implications in different dimensions that nudge customers towards the sale.

2018-12-14

NCSC Aims To Inspire Young Female Code-Breakers

The British National Cyber Security Centre has a competition to inspire the next generation of cyber security experts... and it's just for girls.

2018-12-17

Banks Lose Tens Of Millions Of Dollars In Hollywood-style Hacks

Banks in Eastern Europe targeted by cyber-criminal gangs using the sort of tactics usually seen only in Hollywood movies.

2018-12-19

IoT Cybercrime Hotspot In Canada

Cyber criminals are shifting their attention from computers to IoT and other internet-connected devices in Canadian homes.

2018-12-19

US Senator Calls For New Cyber Doctrine

Sen. Mark Warner calls for a new US cyber doctrine designed to combat modern threats from hackers and disinformation campaigns.

2018-12-18

Three Ways Facebook Could Clean Up Its Act

Facebook, Twitter and other social media companies are causing society-wide damage. Here are three ideas to reduce the harm they do.

2018-12-14

Edward Snowden Calls For Google To Stay Out Of China

Edward Snowden adds his voice to human rights groups asking Google to back out of its plans to launch a censored search engine in China.

2018-12-17

Insurance: Common Cyber Security Myths

We look at the myths around cyber insurance and ask the million-dollar question: can your business afford not to have it?

2018-12-13

Hackers Step Out Of The Shadows With Bigger, Bolder Attacks

Stealth and secrecy used to be the hallmarks of cyber warfare. But increasingly, cyber attacks are now carried out in full public view.

2018-12-14

Indian Government To Provide Handbook On Cyber Safety To School Children

The booklet on cyber safety for teenagers tries to address the increased use of smartphones, gadgets, online gaming and social media.

2018-12-13

Supply Chain Attacks Are On The Rise

Third-party vendors and suppliers are insiders too. They need to be included in the corporate Insider threat Program. By Marcell Gogan

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

Checksum Consultancy

Checksum Consultancy

Checksum Consultancy specializes in Information security, Risk management, and IT governance.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Bionic

Bionic

Bionic is an agentless way to get control over your increasingly complex applications so you can manage, operate, and secure them faster and more efficiently.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Toro Solutions

Toro Solutions

Toro provide managed security & consultancy to keep governments, businesses & society resilient in the space where cyber, physical & people security converge.

CeTu

CeTu

CeTu - Data Orchestration for the Modern SOC. Strengthen security and optimize costs with the world's first AI-native platform for scaling and future-proofing your data stack.