FREE TO VIEW


« Back to News

2016-07-11

China’s South Sea Cyber War

Beijing's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-08

Brexit Fallout Continues – ePrivacy

UK losing influence over the EU review of online privacy laws just as the long-running dispute over transatlantic data transfers appears to be settled.

2016-07-08

Cybersecurity Insurance – What Is It? How Does It Work?

Cyber insurance has been around for almost a decade, but is only now becoming a popular safeguard against hackers.

2016-07-07

Chilcot: False Intelligence Led To Iraq Invasion Which Spawned IS

MI6 was misled to believe Saddam Hussein was producing WMD by a false agent who based his reports on a Hollywood action movie.

2016-07-08

Tesla Test Driver Dies On Autopilot

A Tesla test driver was killed in the first known fatal crash involving a self-driving car. He was watching a film at the time of collision.

2016-07-06

Is Edward Snowden Really A Russian Agent?

To anybody acquainted with how Russia’s powerful intelligence services operate, the idea that Snowden is their collaborator is hardly controversial

2016-07-06

Is The Boom In Ransomware Stabilizing?

The criminal world appears to be fully incorporating ransomware into its business model.

2016-07-07

Germany's Intelligence Chief Accuses Russia of Cyber Warfare

Germany's domestic intelligence agency says Russia launched attacks against the German parliament, other NATO members & French TV.

2016-07-07

Hacking Pros Don’t Trust The Internet

The real danger to the security of sensitive data is from seemingly benign faces inside the same companies that are trying to keep hackers out.

2016-07-06

China’s Cyber War Capabilities Alarm The Neighbours

China's cyber war capabilities could change the strategic balance in Asia, eclipsing the potential danger of rising tensions in the South China Sea.

2016-07-05

Donald Trump, Hillary Clinton & Russian Hackers

Sophisticated hackers are attempting to penetrate the computer networks of all the US Presidential candidates.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Advisen

Advisen

Advisen is the leading provider of data, media, and technology solutions for the commercial property and casualty insurance market including cyber risk.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

DeNexus

DeNexus

DeNexus is the leading provider of cyber risk modeling for industrial networks. Our Mission is to build the Global Standard for Industrial Cyber Risk Quantification.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Schillings

Schillings

Shillings defends your rights to privacy, reuptation and security. We fight passionately against breaches of your privacy, attacks on your reputation and threats to your security.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.

Repello AI

Repello AI

Repello - making AI safe to trust. We help you continuously red-team your GenAI applications against ever-evolving AI threat landscape.