FREE TO VIEW


« Back to News

2018-05-18

How Do Hackers Hide Their IP Address?

Cyber-criminals could be operating from any part of the world and can remain untraceable because they can hide their IP addresses from prying eyes.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-05-17

About Cyber Insurance

Following a sequence of international events featuring major data breaches, cyber insurance has really caught on. Here's a quick summary.

2018-05-17

Corporate Lawyers Brace For GDPR

In-house lawyers expect to play a greater role in cybersecurity as organisations brace themselves for the arrival of the GDPR data protection regime.

2018-05-16

Your Next Bank Card is a Finger-Scanner

Biometric Authentication: People may forget their PINs but very rarely do they go out without their fingers.

2018-05-16

Getting The Most From Investing In AI

Artificial Intelligence is forcing companies to apply a business strategy that combines intelligent technologies and human talent to reach customers.

2018-05-16

Why Are So Few Women In Cybersecurity?

Males hold three out of four jobs in the tech world, but it is in cybersecurity where the lack of participation of women is most acute.

2018-05-15

Blockchain Is Transforming The Investment Business

Until recently, investors hardly knew what blockchain & crypto-currencies were. Now, blockchain is transforming finance & investing.

2018-05-15

Seminar: Next Steps For Cyber Security In The UK

London Thursday, 12th July. A timely opportunity to discuss key issues surrounding cyber security in the UK. CPD Certified.

2018-05-15

First GDPR. Now A New EU Cyber Regulation

The Network & Information Security (NIS) regulation is aimed at creating a base level of security for essential services within the EU.

2018-05-14

Real-Time AI Gets Close To A Brainwave

Microsoft Azure's Cloud Service introduces 'Project Brainwave' a hardware architecture designed to accelerate real-time AI calculations.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

SiteGuarding

SiteGuarding

SiteGuarding provide website security tools and services to protect your website against malware and hacker exploits.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

ComCERT

ComCERT

ComCERT SA is an independent, private consulting company focusing in the assistance of its customers facing the dangers of cyber threats and security incidents.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Blockchain Reactor

Blockchain Reactor

Blockchain Reactor is a blockchain consultancy and implementation company providing cutting-edge blockchain solutions for start-ups and enterprises.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Raman Power Technologies

Raman Power Technologies

Raman Power Technologies focus on bringing value and solving business challenges through the delivery of modern IT services and solutions including cybersecurity.

Def-Logix

Def-Logix

Def-Logix was founded in 2008 to help solve cyber threats being experienced by government agencies of the United States.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Centre for Cyber Security Research & Innovation

Centre for Cyber Security Research & Innovation

The Centre for Cyber Security Research & Innovation is Nepal's First Academic Research Institute to focus on understanding the overall Information Security of Nepalese Organizations.

Intracis

Intracis

Intracis is a 'Made in India' cyber incident management solution aimed at ‘Making Security Simple’ by simplifying cyber incident management for CERTS and CSIRTS.

Realm.Security

Realm.Security

Realm.Security is pioneering the creation of an easy-to-implement, simple-to-use security fabric solution that is purpose-built for cybersecurity.