FREE TO VIEW


« Back to News

2018-10-02

How To Hack the Hackers: The Human Side Of Cybercrime

As cyber-attacks grow more sophisticated, those who defend against them are using behavioural science to understand perpetrators and victims.

2018-10-02

Machine Learning Algorithms & Police Decision-Making

Use of machine learning in police decision-making is in its infancy and the impact of algorithms on police officers’ actions is poorly understood.

2018-10-01

SMEs Risk Costs Of Up To $2.5m Following A Breach

Cisco say that larger organizations tend to be more resilient than SMEs after an attack as they have more resources for response and recovery.

2018-10-01

UK Newspaper Industry Demands Levy On Tech Firms

The British newspaper industry thinks that the government should force social media platforms like Facebook and Google to pay for journalism.

2018-10-01

NATO Can’t Agree On What A Cyber Attack Is

NATO member states have not reached consensus on how to actually count and categorise cyber incidents across the alliance.

2018-10-01

Major Facebook Breach: 50m Users Compromised

An attacker can take full control of the victim’s account, including logging into third-party applications that use Facebook Login.

2018-09-28

US Has Devastating Cyber Weapons

The crippling power of US cyber weapons will be deployed more often as authority for their use is moved further down the chain of command.

2018-09-28

UK Builds 2,000-Strong Offensive Cyber Force

Britain's ability to wage war in cyberspace is getting a massive boost with the creation of a new, 2,000-strong offensive cyberspace force.

2018-09-28

Fancy Bear Have A Nasty New Weapon

Russia’s 'Fancy Bear' hackers have new malware that’s virtually impossible to eradicate, capable of surviving a complete hard drive wipe.

2018-09-28

Hackers Stealing High Grade Academic Research

Iranian hackers obtained access to secure university systems and research databases by phishing university staff & using spoof domains.

2018-09-27

Hackers Are Fighting A Surrogate Cold War

Hybrid warfare incorporates cyber tactics focusing on soft targets, disrupting businesses & parts of the economy previously thought safe from attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

Allegro Software

Allegro Software

Allegro provide secure software for the Internet of Things.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

Security Onion Solutions

Security Onion Solutions

Security Onion Solutions is the creator and maintainer of Security Onion, a free and open platform for threat hunting, network security monitoring, and log management.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Nova Leah

Nova Leah

Nova Leah helps connected medical device manufacturers meet cybersecurity compliance requirements throughout the entire product lifecycle.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.

CyberSG TIG Centre

CyberSG TIG Centre

CyberSG TIG Centre aims to propel Singapore as the world’s premier cybersecurity innovation hub for economic growth.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.