FREE TO VIEW


« Back to News

2016-02-26

Ex - CIA Spy Confirms That The US And Russia Are At Cyber War

Surprise: The US has engaged in "offensive cyber operations" against Russia.

2016-02-23

Israeli Cybertech Startups Set Trends

Cybertech 2016 in Tel Aviv showcased Israel's cybertech startups trying to make it big in the country's saturated tech startup ecosystem.

2016-02-26

Drones Could Fabricate Buildings Using 3D Printing

Swarms of unmanned aerial vehicles (UAV) will be able to print emergency shelters for survivors of natural disasters, buildings & large structures.

2016-02-24

All The Gadgets Coming To Your Next Car

The latest and greatest in new automotive gadgets include a sports car with it's own drone.

2016-02-24

The Big Three: N. Korea, ISIS and CyberWar

U.S. Director of National Intelligence James Clapper identifies three major threats to US security in 2016.

2016-02-24

The Sony Hackers Are Alive And Still Hacking

N. Korea? Vengeful ex- employees? Cyber criminals? One thing we know - they can't spell.

2016-02-24

AI Could Leave Half Of The World Unemployed

AI’s economic threat should not be understated. Machines could put half the world’s population out of a job in the next 30 years.

2016-02-23

Energy Utilities Highly Vulnerable To Cyber Attacks

IT professionals in the Energy & Utilities sectors are not not optimistic their organisations can detect & protect against damaging cyber attacks.

2016-02-23

Strategic Intelligence For The 21st Century.

Terrorism today is a widening series of global alliances assisted by social media and electronic propaganda. Opinion by Alfred Rolington

2016-02-23

FBI's War On Encryption Is Unnecessary

The data trails we voluntarily leave allow IOT devices and social media networks to track us in ways the government can easily access.

2016-02-23

Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion each year; why exactly are attackers getting away without being brought to justice?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

Advanced Resource Managers (ARM)

Advanced Resource Managers (ARM)

ARM provide specialist recruitment services for technology and engineering including cyber security.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

Wibu-Systems

Wibu-Systems

Wibu-Systems is a leading provider of solutions for the Digital Rights Management (DRM) and anti-piracy industry.

Secardeo

Secardeo

Secardeo is a provider of corporate solutions using digital signatures and certificates. Our solutions enable the user transparent end-to-end encryption of e-mails between organizations.

RiskRecon

RiskRecon

RiskRecon makes it easy to gain deep, risk contextualized insight into the cybersecurity risk performance of all of your third parties.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Cloud Software Group

Cloud Software Group

Cloud Software Group provides mission-critical software to enterprises at scale.

Liquid C2

Liquid C2

Liquid C2 offers leading solutions to streamline workplace operations, secure cloud storage, rapid data recovery, and scale growth.

Yondu

Yondu

Yondu empowers businesses across various industries through a wide array of innovative technology solutions to help them scale in the new digital economy.