FREE TO VIEW


« Back to News

2016-12-15

People Are Saying Machine Learning Will Reduce Cyber-Crime

Global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021 it is predicted. Can machines fix that?

2016-12-14

Surprise: N Korea Hacked S Korea Cyber Command

N Korea appears to have hacked S Korea's cyber command in what could be the latest cyberattack against Seoul.

2016-12-14

An Entire Anti-Drone Industry Is Emerging

New tools will enable drone detection, tracking, identification, disabling, even hacking and hijacking unwanted drones as they fly.

2016-12-19

Medical Implants Can be Hacked

Research shows it is possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work.

2016-12-19

British Police - Stay Safe From Cyber Crime This Christmas

10 Top Tips: Police advice on how to stay on guard and not fall victim to cyber crime this Christmas.

2016-12-15

Six Cyber Predictions For 2017

McAfee Labs 2017 Threats Predictions report gives government IT managers a heads up on what to expect next year.

2016-12-16

Self - Flying Aircraft Take To British Skies

A pilotless plane is being prepared for testing in UK airspace to help refine systems that control autonomous aircraft.

2016-12-13

Five Biggest Data Breaches In History (That We Know About)

Data Loss is up 30% in the first 6 months of 2016 and Identity Theft is now the favourite tactic for hackers and cyber criminals. Here are 5 big ones.

2016-12-12

Snowden Worried That He'll Face Prison Or Execution If Russia Sends Him Home.

From safety in Moscow, Snowden says he has no regrets about blowing the whistle on the NSA but admits he's worried about being handed over to the US.

2016-12-09

Facebook, Microsoft, Twitter & YouTube: Collaborating To Remove Terrorist Content

Social media heavyweights announce they will cooperate on a plan to help limit the spread of terrorist content online.

2016-12-08

Rise Of The Machines

The Institute for Critical Infrastructure Technology (ICIT) say the Mirai Botnet attack on Dyn was just a rehearsal for an even bigger event.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SSH Communications Security

SSH Communications Security

SSH Communications Security is a leading provider of enterprise cybersecurity solutions for controlling trusted access to information systems and data.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Evolve Secure Solutions

Evolve Secure Solutions

Evolve Secure Solutions is a security focused managed services provider serving private and public customers across the UK.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Binarii Labs

Binarii Labs

Binarii are focused on helping enterprises to design and deploy SaaS solutions that utilise DLT (Digital Ledger Technology) effectively, efficiently and sensibly.