FREE TO VIEW


« Back to News

2016-08-05

Data Protection Tips for Proposed US Cybersecurity Laws

Proposed new US cybersecurity legislation is making many businesses nervous. These tips will help you be prepared.

2016-08-05

Key Trends In Machine Learning & Artificial Intelligence

While there is agreement on the importance of machine learning, few companies have adequate expertise to get the technology to do what they want.

2016-08-07

Companies See Cyber Threats But Can’t Deal With Them

As the risk of cyber-crime intensifies, most large organizations are still not prepared to deal with the onslaught of digital attacks.

2016-08-04

Cybersecurity Is A Boardroom Blind Spot

Wake Up Call: Most boardrooms only hear about cybersecurity twice a year. Or until there is a business critical cybersecurity incident.

2016-08-03

Half UK Employees Have No Cyber Security Training

Clearly there is work to be done in changing the perception of cybersecurity and building a pipeline of qualified cyber security workers.

2016-08-03

Shedding Light On The Dark Web

Fast growing online markets are helping illicit drug dealers to professionalise their business, with a focus on customer service & product quality.

2016-08-03

Don’t Underestimate Virtual Reality

Why are major technology companies, including Google and Facebook, making big investements in Virtual Reality?

2016-08-02

Quantum Computing: The US Airforce Needs Help

The US Air Force has $40m to spend on researching Quantum Computing, an emerging technology to process complex equations.

2016-08-02

Cyber Attacks On Banks Prompt New Regulatory Safeguards

US regulators are worried that the surge in frequent, aggressive digital breaches could cripple the entire financial system.

2016-08-02

Cyber Threats & Nuclear Weapons

The spread of cyber weapons and their information-warfare capabilities, are challenging conventional thinking about nuclear weapons.

2016-08-01

Was The Internet Created In A Bar?

There are several different versions of how, where and by whom the Internet was created. Here's one. Two men walk into a bar....

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Identity Theft Resource Center (ITRC)

Identity Theft Resource Center (ITRC)

ITRC is a non-profit organization established to empower and guide consumers, victims, business and government to minimize risk and mitigate the impact of identity compromise and crime.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

ClamAV

ClamAV

ClamAV is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security.