FREE TO VIEW


« Back to News

2017-12-05

US States Turning To Insurance

Local Government has proven vulnerable. Now more US states are buying cyber insurance to protect themselves from the consequences of a breach.

2017-12-04

UK Drone ‘pilots’ Must Pass Safety Tests

Police will have powers to ground unsafe drone operators and new 'virtual barrier technology' to stop the machines operating in restricted areas.

2017-12-04

British Police Lose Phone & Web Search Powers

Mass harvesting of personal communications data can only be considered lawful if accompanied by strong independent & judicial safeguards.

2017-12-02

NSA Employee Pleads Guilty To Stealing Classified Information

A former NSA employee illegally took classified documents which were later stolen from his home computer by hackers working for Russian spies.

2017-12-01

Paying For The UK’s Cyber War With Russia

The UK Government is torn over whether to cut funding for conventional forces to spend more of the Defence budget on cybersecurity measures.

2017-12-01

What Is the Dark Web? Can You Access It?

Careful: The Dark Web can be visited by anyone, but it is difficult to work out who is behind the sites & dangerous if your identity is discovered.

2017-12-01

Toyota Is Making Humanoid Workers

Neither Replicant nor Robocop: Toyota has designed a human assistance robot with a range of applications that is meant to be 'Fun & Friendly'.

2017-11-30

Replaying Crime Scenes With An Advanced Scanner

Canadian police forces use a forensic laser scanner capable of detecting the tiniest of details and recreate collisions and crime scenes in 3D.

2017-11-30

Cyber Criminals Stealing Reward Points & Air-Miles

Russian-speaking countries pose the “number one cyber-crime threat to the UK” as cyber criminals focus on stealing victims' reward points & air-miles.

2017-11-29

Apple Must Fix Its Embarrassing Password Bug

A security researcher has uncovered a bug in Apple macOS High Sierra so remarkably simple, it is described as a "howler" and "embarrassing".

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cyber Security Academy - University of Southampton

Cyber Security Academy - University of Southampton

An industry/University partnership established to advance cyber security through world class research, teaching excellence, industrial expertise and training capacity.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Scarlett Cybersecurity

Scarlett Cybersecurity

Scarlett Cybersecurity provide cybersecurity services to US private and public organizations with specific emphasis on compliance and cybersecurity incident prevention, detection, and response.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Adsigo

Adsigo

Adsigo AG is your reliable and professional partner for all topics concerning PCI certification, compliance and information security.

System Two Security

System Two Security

System Two Security automates detection engineering and threat hunting.

Hexagate

Hexagate

Hexagate is at the forefront of blockchain threat prevention and automated risk management, proactively detecting and mitigating threats to smart contracts and onchain assets.

AFINE

AFINE

AFINE is a trusted advisor in the field of cybersecurity and pentesting.