FREE TO VIEW


« Back to News

2018-11-21

Industrial Control Systems Are A Soft Target For Cyber Attackers

Improperly protected Internet-connected industrial control systems are vulnerable to attacks that can cause catastrophic harm.

2018-11-19

Cybersecurity Vigilance Is Mandatory

Mobile Devices, Cryptojacking, Botnets and Encrypted Traffic are four key vulnerabilities that security leaders should be focusing on right now.

2018-11-19

South Korea To Triple Investment In Blockchain

The S Korean government will invest $35 million next year’s to develop blockchain technology & related distributed ledger technology.

2018-11-21

Journalists Aim To Detect Deepfakes

Across the media industry, news organisations can consider multiple approaches to help authenticate news stories if they suspect alterations.

2018-11-20

AI For Cyber - You Don’t Need To Know The Threat, Just The Network

AI driven cybersecurity does its work not by hunting viruses but by understanding networks.

2018-11-19

Delay, Deny and Deflect: How Facebook’s Leaders Fought Through Crisis

A bombshell report on Facebook management’s struggles to deal with data breaches, failures to protect privacy and electoral interference.

2018-11-19

Japanese Cybersecurity Minister Does Not Use Computers

The Japanese Government minister in charge of major changes to a key cybersecurity law has admitted he rarely uses a computer.

2018-11-19

AI Is Revolutionising Digital Marketing

With the ability to collect data, analyse it, apply it and then learn from it. ArtificiaI Intelligence is transforming digital strategy for business.

2018-11-22

What Is The GRU & Who Does It Hack?

The GRU is Russia’s Main Intelligence Directorate and officially it doesn’t exist, but its agents are very busy. Who are they and what do they do?

2018-11-16

The Search To Find Cyber Security Experts Of The Future

An online programme designed to inspire teenagers in the UK to think about a career in cyber security will continue for a second year.

2018-11-16

GDPR Alert As Average ICO Fines Double In A Year

The value of fines issued by the British Information Commissioner’s Office (ICO) has increased 24% in the past year.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Think Cyber Security (ThinkCyber)

Think Cyber Security (ThinkCyber)

ThinkCyber is a Tel Aviv-based Israeli company with a team of cybersecurity professionals who are experts in both information and operations technology.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

MPC Alliance

MPC Alliance

A consortium of developers and practitioners of multiparty computation (MPC), committed to accelerating market awareness and adoption of MPC to increase the security and privacy of online services.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

AdronH

AdronH

AdronH is a company of Cyber Security consultants. We support companies and public institutions with their digital transformation to new and secure business platforms.

Jitterbit

Jitterbit

Jitterbit integrates critical business processes and enables application development to deliver the experiences and insights needed by enterprises of all sizes to accelerate their digital journey.