FREE TO VIEW


« Back to News

2017-06-13

SMEs And Cyber Insurance

Small and medium businesses rely on partners and they face a growing range of online challenges. Cyber Insurance has a key role to play.

2017-06-13

NATO Could Go To War In Response To A Cyber Attack

A persistent and devastating attack could trigger what is known as Article 5, NATO’s collective defense measure.

2017-06-12

Putin Applauds Patriotic Russian Hackers

Putin: "patriotic" citizens might be engaged in hacking. Such individuals are joining "the justified fight against those speaking ill of Russia,"

2017-06-12

French Security Chief Warns of Permanent Cyber War

France's top cyber spy says there is risk of "permanent war" in cyberspace as a result of hacking for espionage and fraud by states & criminals.

2017-06-09

UK’s Trident Nuclear Subs Vulnerability To Hackers

The Royal Navy Trident submarine fleet is vulnerable to a “catastrophic” cyber attack that could render Britain’s nuclear weapons useless.

2017-06-09

Leaked NSA Report Claims Russian 'Cyber Espionage' Against US Elections

At least one company providing software for the electoral process was targeted and 100 local election officials targeted by spear-phishing emails.

2017-06-09

Islamic State's Social Media Strategy

So called Islamic State is fighting on many fronts and puts media warfare on a par with its battle on the ground.

2017-06-12

Uber In Legal Fight With Google

Uber has fired the engineer accused of stealing secrets from Google after he failed to assist with an investigation related to the lawsuit.

2017-06-09

How To Integrate Threat Intelligence

In a complicated, fast-paced cyber environment, it's difficult to hunt for vulnerabilities. Automating threat intelligence can help you find them.

2017-06-12

Cyberspies: The Secret History of Surveillance, Hacking And Digital Espionage

The intertwining forces of computers & espionage are reshaping the world; what was once the preserve of intelligence agencies now affects us all.

2017-06-12

'Friendly Hackers' Hijack UK Shopping Centre Billboard

Liverpool One shopping centre in the UK has been forced to shut down digital billboards after an unknown hacker tampered with the signage.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Norsk Akkreditering

Norsk Akkreditering

Norsk Akkreditering is the national accreditation body for Norway. The directory of members provides details of organisations offering certification services for ISO 27001.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Crown Sterling

Crown Sterling

Crown Sterling delivers next generation software-based, AI-driven cryptography in the form of random number generators and encryption products.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Iron Bow Technologies

Iron Bow Technologies

Iron Bow Technologies is a leading IT solution provider dedicated to successfully transforming technology investments into business capabilities for government, commercial and healthcare clients.

Stripe OLT

Stripe OLT

At Stripe OLT, we provide complete business technology solutions - Our team has an unrivalled reputation as a Microsoft Gold Partner, specialising in secure, cloud-first technology.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

TrustFour

TrustFour

TrustFour is a pioneer in workload and non-human identity security, providing innovative solutions for compliance, remediation, post quantum resiliency, and advanced threat defense.