FREE TO VIEW


« Back to News

2017-10-09

A 9-Step Guide For GDPR Compliance

In May 2018, the General Data Privacy Regulation will take effect, significantly altering the way organisations handle and store data. Be prepared.

2017-10-09

British Police’s First Cyber Dogs

Police are using the detection dogs to track down computer software hidden in homes of suspected sex offenders.

2017-10-02

Facebook To Give Congress Thousands Of Election Ads Bought By Russians

Full Disclosure: Facebook will provide US Govt. thousands of ads purchased by Russians during the 2016 US presidential race.

2017-10-09

Iranian Hackers Linked To Malware

Iran has earned a reputation for aggressive state-sponsored hacking, stealing data from corporate and government networks around the world.

2017-10-09

China Wants To Use AI To Predict Civil Disorder

China’s domestic intelligence chief tells police to use Artificial Intelligence to improve their ability to predict social unrest.

2017-10-05

N.Korea's Cyber Threats To S.Korea

Alongside the escalating missile threat N Korea is stepping up cyber intrusions with fake communications and hacking attacks.

2017-09-21

Bashing Facebook Is Not The Answer To Curbing Russian Influence Operations

Scapegoating Facebook is an easy way to explain Russian influence on the US election, but distracts from more fundamental questions.

2017-09-20

Wikileaks Release Details Of Mass Surveillance In Russia

For the first time Wikileaks has released (what it claims is) material directly pertaining to the Russian state and its mass surveillance apparatus.

2017-09-25

Is A Cyberattack An Act of War?

As warfare becomes increasingly digital, countries are facing a major problem: It’s hard to define when a cyber attack constitutes an act of war.

2017-09-21

Get Your Data Strategy On Board

Only 32% of UK organisations plan to significantly invest in data and analytics in 2017, according to new research by DataIQ Leaders.

2017-10-05

The Hidden History of CyberCrime Forums

In 2001 a crime forum created to monetise stolen credit card numbers formed the framework for today's criminal underground.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.

Backblaze

Backblaze

The Backblaze Storage Cloud provides a foundation for businesses, developers, IT professionals, and individuals to build applications, host content, manage media, back up and archive data, and more.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.