FREE TO VIEW


« Back to News

2018-12-10

PAS Global Named Leader In Industrial Control Systems Cyber Market

PAS Global named the Frost & Sullivan 2018 North American Technology Innovation Award winner for its ICS cybersecurity software.

2018-12-04

Selecting The Right SCADA Technology

Modern SCADA technologies offer choices that satisfy functionality and security requirements while improving performance for remote users.

2018-12-03

Five Trends In Attacks On Industrial Control Systems

Attacks on industrial control systems are up, according to Kaspersky and Symantec. The attack data reveals five specific trends.

2018-11-29

Facebook's Sheryl Sandberg Is 'Tainted' By Crises

As the problems swirling around Facebook gain force, some insiders think that COO Sheryl Sandberg may end being handed the blame.

2018-11-29

Google Challenged Over Location Tracking

Seven consumer groups have filed complaints against Google with national regulators, alleging that user location tracking is in violation of GDPR.

2018-11-29

Uber Fined By Regulators In Britain & The Netherlands

Avoidable data security flaws allowed the personal details of around 2.7 million UK customers to be accessed and downloaded by attackers.

2018-11-30

Barclays Fights Off Cyber-Attacks Daily

Barclays Bank fights off attacks from cyber criminals every single day, according to the head of the bank’s cyber security operations centre.

2018-11-28

British Parliament Seizes Facebook Documents

Rarely used parliamentary powers have been used to demand that a US software firm hand over secret data and Facebook say they want it back.

2018-11-29

Cyber Attacks On Australia Reveal A Pattern

Skip R&D, go straight for the IP: China is breaking an agreement with Australia not to steal each other's commercial secrets.

2018-11-29

From Machine Learning To Machine Reasoning

AI doesn’t fit the technology adoption lifecycle pattern. Rather it’s a quest… a quest for the intelligent machine.

2018-11-27

Russian Hackers Have New Weapons

Call them by their names: Fancy Bear, Cozy Bear, APT28 and Sofacy. They are all launching fresh attacks and one is on a mini-espionage campaign.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Libraesva

Libraesva

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

IONOS

IONOS

IONOS is a leading provider of cloud infrastructure, cloud services, and hosting with more than 8.5 million customers contracts.

Professional Labs

Professional Labs

Professional Labs specialize in simplifying complex problems for our customers with Cloud Services, Managed Services and Cyber Security.

eTech S.C.

eTech S.C.

eTech specialize in a broad range of technology solutions, including software development, cybersecurity, infrastructure, and IT outsourcing (ITO) services.