FREE TO VIEW


« Back to News

2018-06-13

F-35 Is The Most Thoroughly Tested Cyber Weapon

Debugging: With almost 9m lines of software code the new warplane has been described as essentially a flying computer.

2018-06-12

Facebook Admits Privacy Settings 'Bug' Affects 14 Million Users

Bad To Worse: Forget about giving user data away to dodgy business partners, it looks like Facebook can't protect your privacy even when it wants to.

2018-06-12

Cyber Thesaurus - Vocabulary Pt.1

Cyber-security has its own intimidating jargon. You’ll be better equipped to address your cyber risks when you know the terminology.

2018-06-12

Russia Is Building A Separate Military Cloud

Russia is building a giant military cloud, to improve its ability to keep operating if its connection to the global Internet is hacked or severed.

2018-06-12

Banking Botnet Profit Share

The experts at Flashpoint say two separate banking botnets appear to have started a collaboration targeting systems to steal money.

2018-06-12

Ukraine Detects A Cyber Attack On A NATO Member

The Ukraine Security Service claims to have frustrated an attempted attack on a NATO member state, but remains oddly silent about which one.

2018-06-11

Digital Shock: Special Report (£)

The 4th Industrial Revolution will create an integration of digital, physical and biological systems that will significantly change our world.

2018-06-11

A Looming US vs China Tech War Over Huawei

A full-on tech trade war between the US and China draws closer as the US investigates whether Huawei broke US sanctions against Iran.

2018-06-11

Aircraft Can Be Successfully Hacked In-Flight

A security expert will show BlackHat 2018 how it is possible to hack into in-flight aircraft WiFi networks and Satcom equipment from the ground.

2018-06-11

Ex-GCHQ Boss: Nation State Cyber-Attacks Affect Everyone

All organisations are potential targets of nation state attacks, according to former GCHQ Chief, Robert Hannigan, speaking at Infosecurity18.

2018-06-11

Pentagon Faces Big Challenges In Retaining Cyber Talent

The U.S. Department of Defense faces tremendous challenges in recruiting and retaining trained & experienced cybersecurity professionals.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

Proton

Proton

Proton provides free encrypted email, calendar, drive, password manager, and VPN services. Building a better Internet.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.