FREE TO VIEW


« Back to News

2017-09-29

Put Your Physical Security Into The Cloud

The cloud revolution has the potential to change every aspect of physical security, offering ways of doing things that never existed before.

2017-09-29

India Cracks Down On Drones

India will upgrade its airports and airstrips in view of the unregulated use of drones and the constant threat from terror groups.

2017-09-28

Spy Chiefs Set Sights On AI And Cyber

US intelligence directors are in agreement: the ability to harness data & artificial intelligence is a major priority for the intelligence community.

2017-09-19

The EU Holds Its First Cyber War Game Exercise

Crisis Management: European Union national defense ministers have been taking part in a simulated cyber-attack exercise for the first time

2017-09-19

India’s Cyber Insurance Business Is Flourishing

Cyber risk is a major threat to Indian businesses today as companies increasingly face new vulnerabilities due to exposure.

2017-09-28

Universities Are Targets For Cyber Criminals

The number of cyber attacks on British universities has doubled over the past year as criminals, attempt to steal important research.

2017-09-28

Cybersecurity Tips For Smaller Businesses

Forget “It’ll never happen to us”. Small businesses are big targets for hackers, and the financial implications can be crippling. Protect yourselves.

2017-09-16

Facebook T0 Spend $1b On VideoProduction

Facebook plans to invest $1 billion to fund original content initiatives for its new Watch video platform aimed at competing with Apple.

2017-09-27

Is the Flying Car Ready For Take-off?

As densely populated cities become bigger and more congested several well-funded new companies are developing urban flying cars.

2017-09-27

Cybersecurity Investigations After US Naval Collision

Probing for potential cyber intrusions will become a standard procedure following unexplained collision damage to a US guided missile destroyer.

2017-09-28

Global Cyber Conflict Is Close

It is probable, not just possible, that cyberattacks will soon shut down power grids, paralyse financial data systems & sabotage military equipment.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Japan Cybersecurity Innovation Committee (JCIC)

Japan Cybersecurity Innovation Committee (JCIC)

JCIC is an independent and not-for-profit thinktank to establish a secure and safe digital society.

Industrial Defender

Industrial Defender

Committed to ICS Cybersecurity. Industrial Defender provides a fully automated solution to discover, track and report on assets across your ICS footprint.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.