FREE TO VIEW


« Back to News

2018-03-23

About Strategic Threat Intelligence

Threat Intelligence informs you about potential malicious activity and helps you make better decisions about prevention of damaging attacks.

2018-03-22

Cybercrime Costs Londoners £26m Every Month

Scotland Yard say Londoners are losing an average of £26 million a month in cyber attacks on the capital's businesses and citizens.

2018-03-22

African Union HQ Building Bugged

Allegations of embedded espionage at the African Union’s HQ might prompt leaders to be more cautious about Chinese investment proposals.

2018-03-20

Cybersecurity At Sea

Cybersecurity demands board room level attention as well as vigilance from all employees, be they in head office or out on the water.

2018-03-20

On Twitter Fake News Gets More Traction Than Truth

MIT scientists find evidence that Fake News spreads farther, faster, deeper and more broadly than the Truth in all information categories.

2018-03-20

Charities Are Vulnerable To Severe Cyber Attacks

The UK's National Cyber Security Centre is warning British charities could be at risk from a series of devastating cyber-attacks.

2018-03-22

Millennials More Likely To Fall Victim To Cybercrime

Millennials aged 20 - 29 are more likely to fall victim to online and phone-based scams than the 70-plus age group.

2018-03-21

UK Will Have Driverless Cars By 2021

In 2021 the UK government intends the country to be well on its way to a driverless future.

2018-03-20

How AI Has Conquered Democracy

Big Data analysis can maximise the effectiveness of an election campaign and use of AI techniques in politics is not going away anytime soon.

2018-03-19

Big Data And AI For Predicting Human Behaviour

Artificial intelligence has set a benchmark in every other industry and is now all set for behavioral science.

2018-03-19

Ensure Your Cloud Storage Is Compliant With GDPR

Its not just EU organisations: If your website captures visitors’ IP addresses and you have five a year from European countries, GDPR affects you.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SiteLock

SiteLock

SiteLock is a global leader in website security solutions. We provide affordable, cybersecurity software solutions designed to allow small to midsize businesses to operate without fear of an attack.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Cord3

Cord3

Cord3 delivers data protection, even from trusted administrators – or hackers posing as administrators – with high privilege.

Blackbird.AI

Blackbird.AI

Blackbird.AI provides an intelligence and early-warning system to help users detect disinformation and take action against threats.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.