FREE TO VIEW


« Back to News

2016-09-13

Snowden: NSA Hacking Tools Leak Is ‘a warning’

From safety in Moscow and with a new film coming out, Edward Snowden opines on the NSA Equation Group hack.

2016-09-12

New Self-Driving Cars On The Market In 2019

MobileEye and Delphi are cooperating to offer vehicle manufacturers an end-to-end technology platform to make mass-market driverless cars.

2016-09-12

China Puts Quantum Encryption Into Orbit

A new satellite designed to establish ultra-secure quantum communications by transmitting uncrackable keys from space.

2016-09-12

Iraqi Military Invent A Unique Robot To Fight ISIS

Iraqi army is innovating as it deploys new weapons to drive out ISIS from occupied areas.

2016-09-12

Protecting Vehicles From Cyber- Attack

Cars and trucks with GPS, Bluetooth, and internet connections are clearly vulnerable to cyber attacks.

2016-09-12

Leak Spotlights NSA's Conflicting Missions

As well as spying overseas, the NSA has a lesser-known but growing role of helping to protect the US government's sensitive data.

2016-09-08

The Evolution of Hacking

The word “hacker” carries an overwhelmingly negative connotation, conjuring up images of digital thieves. It wasn’t always that way.

2016-09-08

UK Army Goes High-Tech With Future Drones

The British military is planning to invest over $1 billion in speculative technologies including insect-sized drones, laser firearms, & VR goggles.

2016-08-30

Zimababwe Cyber Law Threatens Freedom of Expression

Computer & Cyber Crime Bill would enable government to demand the source of information of any content it deems to be against the law.

2016-08-30

NSA Hackers Demand One Million Bitcoin

Shadowbrokers hold NSA to ransom and want to be paid in everyone’s favorite terror financing and money laundering currency - Bitcoin.

2016-09-07

Uber’s First Self-Driving Cars

Uber is fast catching up with Google in the race to introduce driverless cars.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

SOC.OS Cyber Security

SOC.OS Cyber Security

SOC.OS is an alert correlation and triage automation tool. It correlates and prioritises your alerts, boosting productivity, enhancing threat visibility and shortening mean time to respond.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Lancera

Lancera

Lancera provides growth accelerating Software Development, Web Presence and Cybersecurity Solutions with a focus on customer happiness.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.