FREE TO VIEW


« Back to News

2016-10-10

UK Cyber Highway Will Improve Security

The proposed UK Cyber Highway will give organizations the power to take control online of the Cyber Essentials certification process.

2016-10-13

A New Front In The Business Of Political Espionage

The days of spies trying to get their hands on state and trade secrets are still alive and well today. Except, now they’re digital.

2016-10-11

Lawyers Beware: A Robot Will Take Your Job

Well-tuned search engines could save junior legal professionals a lot of time and suffering. But where does human intelligence come in?

2016-10-05

The Dilemma Of Predictive Policing

How Police authorities respond to information gathered using computer modelling is at least as important as the predictions themselves.

2016-10-14

The Self-Fulfilling Prophecy Of Intelligent Automation

Intelligent automation is going through a rapid democratisation and should no longer be seen as a nightmare of unpredictable, threatening robots.

2016-10-10

How Easy Would It Be To Hack Your Business?

The most important thing any firm can do to protect itself from hacks – both visual and cyber – is to change the way it thinks.

2016-10-11

Cyber Terrorism Keeps At Least One Top FBI Agent Awake At Night

As terror groups direct sympathizers to conduct physical and cyber attacks around the world, the US capital is becoming a more frequent target.

2016-10-13

In New Zealand, Hacking Is A Serious Business

The concerns of New Zealand's leading chief executives vary but if there is anything close to a consensus, it is that cybersecurity is major one.

2016-10-10

Surprise: FBI Say US Political Hacks ‘Probably Was Russia’

A consensus among law enforcement and security analysts: Russian intelligence was almost certainly involved in US election hacks.

2016-10-12

Strategies For A Culture of Cyber-Security

Information security can be an overwhelming concept to grasp, but it's vital to protecting your sensitive business data.

2016-10-11

Islamic State Cyber Attacks

Recent convictions show that IS make a very real national security cyber threat that results from the combination of terrorism & hacking.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Northbridge Insurance

Northbridge Insurance

Northbridge is a leading Canadian business insurance provider. Services offered include Cyber Risk insurance.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) - Pakistan

National Centre for Cyber Security (NCCS) undertakes cyber security research and plays a leading role in securing Pakistan’s Cyberspace.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Willyama Services

Willyama Services

Willyama Services is a certified Information Technology and Cybersecurity professional services business providing services to government and private sector clients.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.

Apex

Apex

We aspire to make the AI revolution run faster, securely, for the benefit of all. We are purposely built for the new AI era and are creating capabilities to safely enable AI.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.