FREE TO VIEW


« Back to News

2017-05-30

Making Sense Of Dark Data

Using AI to analyse the vast amounts of unstructured digital data being generated looks like a growth business. Apple is investing.

2017-05-30

Crimes Of The Future Will Be Solved Using IT, Robot CSIs, Smell & VR

Smell. Sound. Digital Reconstruction: Crime scene investigators will soon be using a raft of new tools & analytical techniques.

2017-05-30

Electronic Warfare Development Rate

The US wants to provide NATO soldiers the ability to understand the electromagnetic spectrum they find themselves in on the battlefield.

2017-05-26

North Korea's Unit 180 Managed WannaCry Attack

Symantec says a hacking group closely tied to North Korea was behind the massive WannaCry attack hitting 200,000 plus computers in 150 countries.

2017-05-26

A Major Development in Deep-Learning

Neurala’s neural network software uses a bio-inspired approach to mimic the way the human brain learns and analyses its environment.

2017-05-26

US Must Project Cyber Warfare Capabilities to Deter Attacks

Unwillingness to operate offensively in cyber-space is driven by a fear of compromising our intelligence community's sensitive tradecraft.

2017-05-25

Attitudes To Facebook Are Changing

Facebook's vast scale has allowed it to amass an almost unrivalled amount of data on citizens around the world. The EU is growing concerned.

2017-05-24

What We Know About The WannaCry Cyberattack So Far

The attack has served as a live demonstration of a new type of global threat, one that could encourage future hackers.

2017-05-23

Trump Signs Cybersecurity Order

Three Components: Protecting federal networks, cybersecurity of critical infrastructure and promoting cyber-security workforce development.

2017-05-25

Cyber Crime Drives Up The Cost Of Insurance

Insurers see coverage against hackers as one of their most promising markets, estimating that premiums will triple over the next four years.

2017-05-24

Industrial Robots Are A Security Weak Link

Web-connected industrial robots used in factories and logistics are insecure, leaving companies wide open to cyber attacks & costly damages.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

CyberCube

CyberCube

CyberCube provide world-leading cyber risk analytics for the cyber insurance market.

usecure

usecure

usecure is a global provider of computer-based cyber security awareness training, offering the market’s most time-efficient, cost-effective and admin-lite solution for reducing insider threats.

Ridge Canada Cyber Solutions

Ridge Canada Cyber Solutions

Ridge Canada helps insurance brokers and insurance buyers understand, evaluate, and secure cyber coverage that is tailored to their business.

ActZero

ActZero

ActZero’s security platform leverages proprietary AI-based systems and full-stack visibility to detect, analyze, contain, and disrupt threats.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Leo CybSec

Leo CybSec

Leo CybSec unites a group of Cyber Security experts with 20+ years of collective expertise to help our clients realise and mitigate the cyber challenges and risks facing their business.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

Cloud Native Computing Foundation (CNCF)

Cloud Native Computing Foundation (CNCF)

CNCF seeks to drive adoption of cloud native technologies by fostering and sustaining an ecosystem of open source, vendor-neutral projects.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.