FREE TO VIEW


« Back to News

2017-04-03

Would Killing Bitcoin End Ransomware?

Cybecriminals often demand payment in crypto-currency. Would ransomware attacks decrease or stop if Bitcoin ceased to exist?

2017-04-03

No Easy Fix For SME Cybersecurity

Small and medium sized businesses are frequent targets for cyber attacks and their results can be devastating.

2017-04-01

Wikileaks Vault 7 And The CIA Hacking Arsenal

The un-cover-up, the fact of the leak itself, is probably more significant than the substance of what has thus far been revealed.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-04-03

Cyber Insurance: 7 Questions To Ask

Insurance for cybersecurity is different from other types of insurance because the nature of threats is constantly changing.

2017-03-31

WikiLeaks Will Share CIA's Hacking Secrets

Tech companies are not lining up to accept Wikileaks offer to get access to the stolen CIA hacking tools to help fix software vulnerabilities.

2017-03-30

Here Comes China’s Crypto-Currency

Forget about Bitcoin. China is busy converting the Renimbi to digital and this crypto-currency has the backing of an entire nation.

2017-03-30

Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure on April 7th.

2017-03-30

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

2017-03-29

WikiLeaks Dump Shines Light On US Intelligence’s Zero-Day Policy

Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies.

2017-03-29

Board-level Cyber Literacy Is Low, Discomfort High

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.

IT.ie

IT.ie

IT.ie are a comprehensive provider of Managed IT Services, Cloud Solutions, Cyber Security, and proactive IT support services.

DigiGlass

DigiGlass

DigiGlass is a cutting-edge cybersecurity service provider powered by Redington Gulf, a leading technology distributor in the Middle East and Africa.