FREE TO VIEW


« Back to News

2017-01-23

Robots Will Take Our Jobs – But That's Good.

The next time you're standing at a busy junction, look around and count how many people you can see driving for a living.

2017-01-23

Are You Ready For State-Sponsored Cyber Attack?

Geopolitical tensions ensure that 2017 will be another big year for large scale and potentially lethal state-sponsored cyber attacks.

2017-01-17

Internet Has Changed The Media Business Model

Advertising media is a broken business model.

2017-01-24

2017: Cybersecurity At A Turning Point

Cybersecurity threats are becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability.

2017-01-18

‘Magic’ Ransomware Is Based On Open-Source Code

Abracadabra: A new ransomware based on open-source code that encrypts user files and ads ‘.magic’ extension to them.

2017-01-18

Drone Warriors Of The US Air Force

Leaving Las Vegas & Commuting To The Warzone: US Air Force drone piots lead a strange double life.

2017-01-17

It Was Not All Bad News In 2016

Last year saw major advances in a number of key technologies: AI, Quantum Computing, Drones, Data Transmission Speeds & Exoskeletons.

2017-01-23

The Swedish Kings of Cyberwar

Forget GCHQ. The Swedish National Radio Defence Intelligence Agency has some remarkable technical capabilities.

2017-01-18

Rome: Cyber Spying Rings Security Bells

The President of the European Central Bank and former Italian prime minister, Matteo Renzi are targets of a cyber spying & hacking operation.

2017-01-18

Hackers Target France’s Presidential Election

After witnessing cyberattacks on the US Presidential election, France is leaving no stone unturned to protect its own election from hackers.

2017-01-18

2017 Tech Trends: 'A Major Bank Will Fail'

Security experts expect some major events in 2017, including a cybersecurity lapse that will bring down a big financial institution.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Brinqa

Brinqa

Brinqa is a leading provider of unified risk management and security analytics.to manage IT governance and technology risk.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Ashley Page

Ashley Page

Ashley Page offer a unique cyber insurance and risk management solution - Cyber+Insure.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Labaton Sucharow

Labaton Sucharow

Standing on the horizon of law and technology, our Cybersecurity and Data Privacy Practice helps to protect consumers who have been harmed by businesses’ failures to safeguard their customers' data.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.

Lupasafe

Lupasafe

Lupasafe is an all-in-one cybersecurity platform for MSPs and SMEs. See all your cyber risks: From training to phishing, darkweb scans, continuous tech monitoring, AI insights, reporting & compliance.