FREE TO VIEW


« Back to News

2017-10-18

Could the US Use A Cyber Attack To Take Down N. Korea?

Both sides have shown off their military and nuclear might, but is it possible to stop a war before it starts with a few clicks of a button?

2017-10-03

Was The German Election Hacked?

With damning evidence now emerging of interference on the US Presidential Election, it is uncertain that German elections were not undermined.

2017-10-03

Deloitte Hit by Cyber Attack: Clients' Private Data Exposed

The hacker compromised the firm’s global email server through an “administrator’s account” giving them privileged, unrestricted “access to all areas”.

2017-09-29

Russia Attacked By ‘Full Scale Cyber War’

Telephone Terrorism: Russia is suffering a "full-scale cyberwar" that authorities say they are are ill-equipped to fight.

2017-10-18

What Is Edge Computing?

Edge Computing allows data produced by IoT devices to be processed close to where it is created, instead of sent to data centres or the cloud.

2017-10-17

Mini Drones That Can See In The Dark

A new type of visual sensor device will allow drones to see as human eyes do, enabling small drones to be much more useful.

2017-10-17

US Air Force Hacked By Teenager

A 17 year old wins the US Air Force Bug Bounty hackathon. Just as well he prefers prize money to theft.

2017-09-26

Former Spy Chief Takes Top Cybersecurity Job

Specialist insurer Hiscox, a Lloyd's of London underwriter, has appointed a former GCHQ Director as its cybersecurity special advisor.

2017-09-26

UK 'biggest audience' In EU For Jihadist Web Content

The Connected World: Online jihadist propaganda attracts more clicks in the UK than any other country in Europe.

2017-10-16

Cybersecurity And Media Companies

Media companies are seeing an increased frequency of cyber-attacks and an enhanced sophistication & complexity to such attacks.

2017-10-16

Machine Learning is Transforming Data

While machine learning might seem a newly emerging trend, which it most certainly is, it is also a breakthrough that has been a long time coming.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

Nexor

Nexor

Nexor are a UK-based cyber security company with 30 years' experience in secure information exchange.

Protected Media

Protected Media

Protected Media’s advanced cybersecurity ad fraud solution guards you against current and emerging threats across Connected TV, Display and Video advertising.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.