FREE TO VIEW


« Back to News

2018-05-08

Blockchain Will Radically Transform Anti-Fraud

Blockchain's distributed ledger technology is ideal for meeting government data rules (GDPR) and serving as a trusted tool for identity verification.

2018-05-03

The Next Russian Cyberattacks Will Be More Damaging

Russia is using cyber warfare methods as part of a wider effort to attack the international system, according to the British Prime Minister.

2018-05-01

Cybersecurity Advice For SMEs

Cybersecurity threats to business originate in the 1980s but many smaller organisations still don't understand the risks to their electronic systems.

2018-04-26

Website Linked To Attacks On UK Banks Is Shut Down

DDOS For Hire: A website linked to more than 4m cyber attacks worldwide, including against some of Britain’s biggest banks, has been shut down.

2018-05-02

Cambridge Analytica Planned To Issue Digital Currency

Cambridge Analytica was planning to raise money by issuing a new type of digital currency before it became embroiled in the Facebook data scandal.

2018-04-26

Hackers Advertise Stolen Personal Data On Facebook

Criminals are using Facebook groups to advertise stolen credit card details, cyber-attacks and logins for hacked Amazon and Netflix accounts.

2018-05-01

DNA Data Storage Moves Closer To Becoming Reality

DNA might replace hard drives & other storage media and there is significant progress, including new, zero-error individual-file data retrieval.

2018-05-01

Facebook Could Save Your Life

Constant Surveillance Can Be Useful: First responders can now use a special Facebook service when conducting rescue missions.

2018-04-30

Instagram Allows Users To Download Everything Shared

Instagram will let users download their personal data, including previously shared photos, videos and messages, as it prepares for GDPR.

2018-05-08

Six Benefits From Artificial Intelligence & Machine Learning

Data is the big new strategic asset. Organisations that can effectively harness AI and Machine learning to exploit their data will be big winners.

2018-04-26

Artificial Intelligence Is Too Narrow

AI is based on sophisticated algorithms and the brute force of huge computing power. This makes it powerful, but its very specificity is a problem.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

SafenSoft (SnS)

SafenSoft (SnS)

SafenSoft delivers high-efficiency, low-impact proactive protection against malware, insider threats, and confidential data leakage.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Department of Justice & Equality - Cybercrime Division - Ireland

Department of Justice & Equality - Cybercrime Division - Ireland

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Quantum Security Solutions (QSec)

Quantum Security Solutions (QSec)

QSec is an innovative information security consultancy based in Ghana. We can provide your organisation with information security products and services that assure against information risk.

RevBits

RevBits

RevBits provides high-performance cybersecurity solutions including email security, endpoint security, deception technology and PAM solution to enterprise companies and public sector organizations.

Conversant Group

Conversant Group

Conversant Group is an IT infrastructure and security consulting company, providing technical, organizational, procedural, and process consulting internationally.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.

Corvid Cyberdefense

Corvid Cyberdefense

Corvid Cyberdefense provides military-grade cybersecurity as a service for growing organizations and municipalities of all sizes.

Ory Corp

Ory Corp

Ory's IAM/CIAM solutions are designed to empower businesses with the tools they need to protect their users, services and things, and maintain compliance.