FREE TO VIEW


« Back to News

2016-07-05

Preventing Hackers From Accessing Financial Information

Combating hackers with voice biometric authentication of customers adds another layer of security to prevent growing fraud.

2016-07-05

IBM Computer To ‘Help’ Accountants

KPMG Australia has signed a deal with IBM to use the Watson supercomputer to do big company audits.

2016-07-05

Hackers Steal $10m From Ukrainian Bank

More grief for the interbank platform SWIFT as hackers extract $millions from an undisclosed bank in Ukraine.

2016-07-04

US & Israel Agree To Co-operate In Cyber Defense

Israel & US agree real-time operational connectivity through the Computer Emergency Response Teams (CERTS) of both nations.

2016-07-04

Is Moscow Trying To Influence The US Presidential Election?

It would seem that Vladimir Putin favours Donald Trump to be US President and is trying to do something about it.

2016-07-01

Frankenstein’s Paperclips

Rules governing the behaviour of AI systems have had currency since Isaac Asimov invented the “Three Laws of Robotics”. Now we need them.

2016-07-01

Government In The Information Age

Alvin Toffller's predictions for the evolution of the Industrial Era into the Information Age are coming true; the role of government must evolve too.

2016-07-01

Edward Snowden’s Lawyer Wants Obama To Give Him A Pardon

An Element Of Absurdity: Edward Snowden's lawyers have vowed to step up pressure on Barack Obama for a Presidential Pardon.

2016-06-30

What Might ‘Brexit’ Mean For Cybersecurity In The UK?

While some cybersecurity pros say that Brexit will have little ill-effect on the industry, others aren't so sure.

2016-06-30

Lessons Learned From Major Healthcare Breaches

Huge amounts of personal health data being collected, shared & analyzed. There are more reasons to worry about patient privacy than ever.

2016-07-04

Enhanced Attribution: An Engine To Identify Hackers

DARPA's “Enhanced Attribution Program” will enable US government agencies to characterize an attacker and predict where they will strike next.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

ISAGCA is a collaborative forum to advance OT cybersecurity awareness, education, readiness, and knowledge sharing.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

Adarma Security

Adarma Security

Adarma are specialists in threat management including SOC design, build & operation.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Nanitor

Nanitor

Nanitor is a powerful cybersecurity management platform focusing on hardening security fundamentals across your global IT infrastructure.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Zerify

Zerify

Zerify offers the industry’s only video conferencing platform built with a zero-trust architecture to keep your meetings secure, private and business compliant.

Avint

Avint

Avint delivers transformational cybersecurity solutions that help both commercial and government entities achieve mission success.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

ALSO Group

ALSO Group

ALSO is one of the leading technology providers for the ICT industry currently active in 31 countries in Europe and in many countries worldwide via PaaS (Platform as a Service) partners.