FREE TO VIEW


« Back to News

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-19

A Breakthrough In Video Analytics

New AI-based video analytics technology powers a 20x improvement in central monitoring and video review through cutting-edge collection & analysis.

2018-09-19

Snowden Demands A Penalty For Misuse Of Aadhaar Data

The Indian government Aadhaar program offers a unique personal ID that can be obtained by residents, using their biometric & demographic data.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-20

Edward Snowden Reconsidered

Five years since Edward Snowden’s revelations of mass surveillance and his subsequent flight to Moscow, here is a lengthy reflection on his actions.

2018-09-18

What Every Small Business Should Know About Hackers & Cybersecurity

It’s a case of when, not if, a cyber attack will take place and preparation is the key. You cannot simply leave it to the IT department to deal with.

2018-09-18

Students Blamed For University & College Cyber Attacks

Analysis of cyberattacks on UK universities' research and academic networks concludes there must be "suspicions" over staff and students.

2018-09-18

A Cyber Attack Could Cause The Next Financial Crisis

The next crisis might come from a cyber attack that causes disruptions to financial services capabilities, especially global payments systems.

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-14

Cybersecurity Needs A Collective Approach

The boom in cybercrime means it is no longer a problem reserved for the IT department - everyone must work together to tackle the threat.

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

IT Security House

IT Security House

IT Security House is a leading European supplier of Cyber Security Intelligence and eCrime services.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Digital Intelligence

Digital Intelligence

Digital Intelligence offer a full array of products, forensic and e-discovery consulting services and training.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.

Qryptonic

Qryptonic

Qryptonic pioneers next-generation cybersecurity by leveraging the unparalleled capabilities of quantum computing to defend against evolving threats.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.