FREE TO VIEW


« Back to News

2016-06-22

New Zealand’s Defence Is Playing Catch Up

Not Before Time: The New Zealand Defence Force will begin to be equipped with a cyber warfare capability.

2016-06-22

Cyber Insurance Is Changing How We Look At Risk

Sony Pictures thought that their General Liabilities insurance covered them against a damaging cyberattack. They learned a valuable lesson.

2016-06-21

Has The Cyber ‘Pearl Harbor’ Already Happened?

The impact of the attack on the US Office of Personnel Management reverberates and the full impact may not yet be apparent.

2016-06-21

Your Next Security Analyst Will Probably Be A Computer

Human security analysts are the bottleneck in security operations.

2016-06-22

Artificial Intelligence And Racism

Racism’s subtle influence can be unexpectedly powerful.

2016-06-21

Twitter Blocks Data Access By US Spy Agencies

Twitter has banned US intelligence agencies from using it's Dataminr alert service.

2016-06-21

ISIS Developing Driverless Cars

Islamic State in Syria (ISIS) technicians are working to develop a Google-style driverless car that could navigate itself.

2016-06-20

US Nuclear Weapons Controlled by 8in Floppy Disks

The US military’s nuclear arsenal is controlled by computers built in the 1970s that still use 8in floppy disks.

2016-06-20

Facial Recognition Prevents Terrorist Attacks

Facial recognition systems need both images and a searchable database. Advances in Iris scanning technology make this process easier.

2016-06-19

Iran Wants To Collect All Social Network Data

The Iranian government wants tighter controls on all foreign messaging and social media apps operating in the country.

2016-06-19

The Use Of Intelligent Deception in Cyber Security

Hackers only need to be successful once, while organizations protecting sensitive information need to successfully thwart threats every day.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Mielabelo

Mielabelo

Belgian consulting firm providing services in the security and compliance of information systems and IT service management.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

HUB International

HUB International

HUB is one of the largest insurance brokers in the world. HUB Risk Services provides the full range of expert consulting to identify risks, reduce exposure to loss and manage claims issues.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Praetorian

Praetorian

Praetorian is an offensive cybersecurity company whose mission is to prevent breaches before they occur.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

SRG Security Resource Group

SRG Security Resource Group

SRG Security Resource Group is a Canadian company dedicated to providing world-class Physical and Cyber Security services.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

RunReveal

RunReveal

RunReveal's mission is to make sure no breach goes undetected. That means having a product that is accessible and effective for companies of all sizes.

CyberTee

CyberTee

CyberTee is an Alliance designed for and by independent cybersecurity professionals to address the talent shortage.