FREE TO VIEW


« Back to News

2018-09-04

Cyber Insurance Has Distinctly Risky Characteristics

The danger of accumulation of cyber risks is a key concern for the insurance market, according to a study released by The Geneva Association.

2018-08-23

Catching The Silent Attacker, And The Next Phase Of Cyber AI

Lurking beneath the surface of enterprises today are subtle, stealthy cyber-threats – how can cyber AI fight back?

2018-09-04

Tomorrow’s Malware Will Attack When It Sees Your Face

AI may soon make malicious software nearly impossible to detect as it waits for just the right person to sit in front of the computer.

2018-09-03

Banks And Retailers Track How You Type, Swipe And Tap

To fight fraud, a growing number of banks and merchants are tracking visitors’ physical movements as they use websites and apps.

2018-09-03

Threat Posed By Satellite Systems

Satellite communications are vulnerable to hackers which, in the worst-case scenario, could turn satellite antennas into weapons.

2018-09-03

UK Police Fail To Take Digital Advantage

Embracing technology remains one of the biggest challenges facing UK police forces. It has already changed what criminals are able to do.

2018-08-22

Russian Military Spy Software Is On Home Routers

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world.

2018-08-21

Why Some Computer Viruses Refuse To Die

There are zombies on the internet - odd, undead lumps of code that roam endlessly seeking and finding fresh victims to infect.

2018-08-20

CyberStars Cyber Security Competition

Over 400 university students participate in CyberStars competition in Rwanda as part of an initiative to build cyber skills and capacity.

2018-08-18

A Guided Tour Of The Asian Dark Web

The Asian dark web is not well known. Researchers from IntSights embarked on a six-month long investigation and analysis.

2018-08-17

AI Takes Hacking To Another Level

The nightmare scenario for computer security - artificial intelligence programs that can learn how to evade even the best defenses

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.