FREE TO VIEW


« Back to News

2018-02-20

A Search Tool That Allows Anyone To Access Cloud Documents

Buckhacker is a hacking tool that trawls unsecured cloud server platforms. Companies using them are at risk of losing control of their data.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-19

What Do CISOs Prioritise To Improve Cybersecurity?

As security has increasingly become a concern for financial institutions, the role of the CISO has been thrust into the organisational spotlight.

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-19

Facebook Personal Data Use & Privacy Settings Ruled Illegal

German court rules that Facebook collects and uses personal data without providing enough information to users for them to give meaningful consent.

2018-02-19

Bitcoin Energy Use In Iceland Soars

Making Money: Electricity use at Bitcoin mining data centres located in Iceland is likely to exceed the energy consumption of all the nation's homes.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-16

Facebook Enables 'Fake News'

Digital Deceit: More people are coming to the conclusion that social networking is an overall negative for society.

2018-02-16

Chinese Healthcare Technology Moves Ahead

The big tech firms like Alibaba and Tencent have made delivering better healthcare a priority and are more ambitious than their international peers.

2018-02-14

Blockchain To Secure Storage Of Sensitive Data

Blockchain technology can improve on current, centralised data security solutions and help keep vital information safe and under control.

2018-02-12

Employees Are Still The Cause Of Most Cyber Breaches

As cybercrime grows at an astronomic rate, is your biggest strength, the human capital in your business, jeopardising your company's security?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

National Agency for the Security of Information Systems (ANSSI) - France

National Agency for the Security of Information Systems (ANSSI) - France

The role of Agence Nationale de la Sécurité des Systèmes d'Information (ANSSI) is to foster a coordinated, ambitious, pro-active response to cybersecurity issues in France.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

AirCUVE

AirCUVE

AirCUVE provide authentication and access control solutions for networks and mobile security.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

Silicon Labs

Silicon Labs

Silicon Labs are a leader in secure, intelligent wireless technology for a more connected world. We provide award-winning hardware and software security to help safeguard connected devices.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

Tenchi Security

Tenchi Security

Tenchi Security are specialized in Third-Party Cyber Risk Management (TPCRM) and aim to reduce information asymmetry when it comes to third and Nth-Party security and compliance risk management.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.