FREE TO VIEW


« Back to News

2018-08-15

Cybersecurity In Self-Driving Cars

There are a broad range of cybersecurity challenges that must be overcome before autonomous and connected vehicles can be widely adopted.

2018-08-15

Law Firms Are Uneducated & Exposed

Law firms often spend far less on cyber insurance than they need to have adequate protection, placing themselves at serious consequential risk.

2018-08-14

Bots & Ballots Make A Sophisticated Threat

Russian efforts to undermine the Democratic 2016 Presidential Campaign appear to have been more complex and extensive than first thought.

2018-07-31

COSCO Cyber Attack And The Importance Of Maritime Cybersecurity

COSCO shipping has been at the receiving end of a cyber attack that saw its operations being hit across the world.

2018-07-30

Facebook Loses $123 Billion In Value

It seems the social media giant's previously inexorable market growth and its euphoric market valuation are both at the point of stalling.

2018-08-14

Five Eyes Spies Turn To Commercial Innovation

The 'Five Eye' countries are starting to consider leveraging the commercial technology sector to address common national security concerns.

2018-07-30

Snowden Describes Russian Government As 'corrupt'

After 5 years living in Moscow, the reality of his situation is sinking in for the renowned ex-NSA intelligence agency contractor.

2018-08-13

A British Puzzle To Find Hidden Cyber Talents

Immersive Labs have created problem - setting software to help ex-services personnel to get started on new careers in cybersecurity.

2018-07-27

Deloitte's Initiative To Reduce The Gender Gap

Currently women only represent 11% of the global cybersecurity workforce, despite the big talent shortage. Deloitte have a plan to help with that.

2018-08-13

Internet Risks Failure As Sea Levels Rise

By 2033, over 4,000 miles of underground fiber will be beneath sea water and hundreds of data centers will be affected by climate change.

2018-08-10

Powering The Future Of Artificial Intelligence

AI’s rapid evolution is producing a very big expansion in various new types of hardware accelerators for machine learning.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IGX Global

IGX Global

IGX Global is a provider of information network and security integration services and products.

Aujas Cybersecurity

Aujas Cybersecurity

Aujas has deep expertise and capabilities in Identity and Access Management, Risk Advisory, Security Verification, Security Engineering, & Managed Detection and Response services.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Forward Global

Forward Global

Forward Global designs and delivers services and technologies to manage digital, economic, and information risks.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

INTfinity Consulting

INTfinity Consulting

The INTfinity team brings together decades of professional experience in cybersecurity. We're here to apply that same experience and proficiency in defending your networks.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.