FREE TO VIEW


« Back to News

2016-11-29

US Election Recounts In ‘Hacked’ States?

Hacking The Vote: Calls for a ballot recount in three critical swing states renew concerns over possible US electoral interference.

2016-11-28

Five Things AI Can Do Better Than Humans

Apart from boardgames, what else is Artificial Intelligence good for? Here are five tasks for AI in which it can equal, or surpass, humans.

2016-11-28

Misinformation & Cyber Attacks During Montenegro Elections

Possible vectors for a foreign power to influence elections in an EU membership candidate country.

2016-11-28

Google Technology To Treat UK Health Service Patients

London's Royal Free NHS hospital trust has teamed up with Google to share patient data using Deep Mind computing power.

2016-11-28

Has Cognitive Computing Arrived?

Cognitive computing has the potential to transform the way we view data analytics.

2016-11-28

Facebook Will Double UK Employees

Facebook will expand its presence in the UK by 50% when it opens its new London headquarters in 2017, the US technology giant has announced.

2016-11-25

The British IP Bill & Protection From Government Snoopers

The UK Investigatory Powers Act, aka 'the snoopers charter' passes in to law in December. It basically removes your right to online privacy.

2016-11-22

Google & Facebook Ban Fake News Sites

It's too late now: Google and Facebook are taking steps to control fake news by closing down access to their advertising networks.

2016-11-22

Spies Use Tinder

Surveillance and infiltration are not new tactics and collecting data from social media shows how the internet is bringing it all to a whole new level.

2016-11-22

Three Step Pogram: Pre-Breach Remedies To Contain The Costs Of A Cyber Attack

Data breaches are very costly. Organisations should consider three basic steps to ensure they are prepared to remedy a future breach.

2016-11-21

Was Donald Trump's Surprise Victory Hidden In The Data?

A dawning realisation that the Technology industry missed something fundamental about the fears & motivations of the people who use its products.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Frazer-Nash Consultancy

Frazer-Nash Consultancy

Frazer-Nash is a leading engineering, systems and technology company. Areas of expertise include information security and cyber security.

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

TSUNAMI

TSUNAMI

The TSUNAMi center focuses on software and system security and how trustworthy software can be built from COTS software components.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

Cyber Qubits

Cyber Qubits

Cyber Qubits is a cybersecurity training and consulting company focused on developing the next generation of cybersecurity professionals.

Andesite

Andesite

Andesite is delivering sustained advantage to cyber defense teams through technology and community.