FREE TO VIEW


« Back to News

2018-03-12

Autonomous Cars Hit The Road In California

Look - No Hands: Tech companies and others working on driverless vehicle systems will begin trialling their cars without a safety driver present.

2018-03-09

Russian Hacker False Flags Work - Even After They're Exposed

False Flag identities for nation-state hackers are just as standard a part of the toolkit as phishing links and infected Microsoft Office attachments.

2018-03-08

Bill Gates Says Cryptocurrencies Are Deadly

Bill Gates is concerned by cryptocurrency, saying that the anonymity offered by the new technology has “caused deaths in a fairly direct way”.

2018-03-15

Real Dangers of Artificial Intelligence

Every AI advance by the good guys is also an advance for the bad guys, according to a panel of academic experts, warning of its malicious use.

2018-03-15

Russia Has Lasers To Shoot Satellites

Russian defense companies have created a plane-mounted laser that can hit satellites, to achieve "destruction of those elements deployed in orbit.”

2018-03-07

Cybercime Against UK Business Is Up 63%

UK Office for National Statistics reports that incidents involving computer misuse and malware against business are significantly up.

2018-03-14

The Mysteries Of Crypotocurrencies

No aspect of the crypto-currency and blockchain space has been as poorly understood as the initial coin offering (ICO). Regulators want clarity.

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

2018-03-09

UK Think Tanks Hacked by Groups in China

Crowdstrike disclose a number of hacks on high profile UK think tanks by China-based groups dating from last year.

2018-03-07

Which Phishing Messages Have A Near 100% Click Rate?

Training employees to spot phishing emails, messages and phone calls needs to be frequent if the organisation wants to see click rates decrease.

2018-03-07

GDPR – Two Thirds of Organisations Aren’t Ready

Confusion: Two thirds of organisations aren't prepared for the General Data Protection Regulation (GDPR) 'right to be forgotten'.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

CryptoCurrency Certification Consortium (C4)

CryptoCurrency Certification Consortium (C4)

The CryptoCurrency Certification Consortium is a non-profit organization that provides certifications to professionals who perform cryptocurrency-related services.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Pacific Cyber Security Operational Network (PaCSON)

Pacific Cyber Security Operational Network (PaCSON)

PaCSON is an operational cyber security network of regional working-level cyber security experts in the Pacific.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

NeuroID

NeuroID

NeuroID combines the power of industry-leading behavioral analytics with advanced device and network intelligence to create your first line of defense against malicious bots, bad actors, and fraud.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.