FREE TO VIEW


« Back to News

2018-11-12

China Has “taken the gloves off” In Hacking Attacks

China has upped its hacking game, improving operational security and penetration skills and learning from Russian expertise.

2018-11-08

China May Be Reading Your Emails

Someone in Beijing may be reading your emails before you do, as well as capturing your passwords & personal data from websites you visit

2018-11-07

Why Has The US Not Been Hit With A Devastating Cyber Attack?

Security experts have been warning about a devastating cyber-attack for over a decade. Here are a few theories why it hasn’t occurred… yet.

2018-11-06

Lloyds Bank Is Replacing Customer Debit Cards After Cyber Attacks

Fraud: The UK bank is going to reissue debit cards to all customers that have made purchases on the British Airways and Ticketmaster websites.

2018-11-06

US Homeland Security Warns Of Dangerous SCADA Flaw

ICS-CERT has warned organizations using Advantech’s ICS products to install an update that kills a remotely exploitable flaw.

2018-11-05

Britain Needs A Cyber Army To Defend Against Prolific Attacks

Britain will be wide-open to state-sponsored hacking of its critical infrastructure, because of a shortage of 50,000 cybersecurity specialists.

2018-11-06

The Pentagon Doesn’t Want To Use Real AI

The US military are planning to use Artificial Intelligence in the narrow sense of using machines to help humans make better decisions.

2018-11-06

What Northrop’s Unified Platform Win Means For Cyber War

Northrop Grumman has been awarded a lead role in developing the next generation of weapons for US Cyber Command. What does that mean?

2018-11-06

AI Gives Businesses Real Customer Insights

Artificial Intelligence is capable of empowering companies to learn more about their customers and improve how they target specific audiences.

2018-11-05

Blockchain Can Improve Manufacturing

Blockchain’s greatest potential to deliver business value is in manufacturing.

2018-11-05

Social Media Companies Scan For Potential Terrorists

The big social media platforms have developed technological and policy-based ways to help identify and prevent extremist content.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Commissum

Commissum

Commissum specialise in information assurance and security testing services.

LEXFO

LEXFO

LEXFO specializes in the security of information systems, assisting clients in protecting information assets using an offensive and innovative approach.

Cydome

Cydome

Cydome offers full-spectrum cybersecurity solutions tailored for the maritime industry.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

KOS-CERT

KOS-CERT

KOS-CERT is the national Computer Incident Response Team for Kosovo.

SEON Technologies

SEON Technologies

At SEON we strive to help online businesses reduce the costs, time, and challenges faced due to fraud.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

NI Cyber Security Centre

NI Cyber Security Centre

NI Cyber Security Centre works to make Northern Ireland cyber safe, secure and resilient for its citizens and businesses.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Blink Ops

Blink Ops

Blink helps security teams streamline everyday workflows and protect your organization better.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.