FREE TO VIEW


« Back to News

2017-11-15

US Data Systems Under Attack

US Homeland Security issue a warning that the nuclear, energy, aviation, water and critical manufacturing industries are targeted by hackers.

2017-11-14

5 Cyber Threats Executives Should Understand

Protecting highly elastic network environments presents business leaders & cybersecurity managers with a complex array of security challenges.

2017-11-14

UAVs To Counter Maritime Piracy

Maritime transport is characterised by high traffic and long distances where container ships have little protection in the open ocean. Drones can fix that.

2017-12-18

Flying Drones Scan Packages 24/7

Its starting to feel a bit like Christmas in the automated distribution warehouse, where drones and robots are overtaking Santa's little helpers.

2017-11-09

Garry Kasparov On AI & Cybersecurity

Garry Kasparov is one of the most brilliant, people to experience what many believe will soon happen to us all: being outsmarted by a machine.

2017-11-16

Cybersecurity Training Isn’t The Complete Solution

Cyber security training firms continue to stress the importance of educating employees in order to minimise the risk of cyber threats. Why bother?

2017-11-10

Tech Giants Face US Congress Over Russia Election

A showdown between Congress and the powerful social media companies that have helped define the current unsettled age in western democracies.

2017-11-14

Electronic Camouflage In Future Warfare

US Intelligence Sources: Traditional visual camouflage methods are no longer adequate against more capable adversaries.

2017-11-27

Self-Drive Cars Coming to Manhattan

With some of the densest and most hectic traffic systems in in N. America, what better city to use for testing autonomous cars than New York City?

2017-11-13

All WiFi Networks Are Vulnerable to Hacking

The security protocol protecting the vast majority of WiFi connections has been broken, exposing wireless Internet traffic to eavesdroppers.

2017-11-17

Artificial Intelligence Needs Regulation

As AI becomes widely available it is driving forward a wide range of industrial applications, but there are some big concerns over cybersecurity.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Proximity

Proximity

Proximity is a leading professional services organisation providing consulting, legal and commercial advisory solutions with a focus on government and regulated industries.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

AT&T Cybersecurity

AT&T Cybersecurity

AT&T Cybersecurity’s Edge-to-Edge technologies provide threat intelligence, collaborative defense, security without the seams, and solutions that fit your business.

Skillfield

Skillfield

Skillfield is a Melbourne based Cyber Security and Data Services consultancy and professional services company.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

iolite Secure

iolite Secure

iolite secures our nation’s infrastructure and critical assets through cyber threat detection, response, and mitigation.