FREE TO VIEW


« Back to News

2016-04-06

Thought Experiment: Predicting Cyber War

There are no historical models for full scale Cyber War - what would it be like and how might it be to conducted?

2016-04-05

Anonymous To Launch Cyberattacks Against Trump

The Anonymous hacktivist collective has announced plans to disrupt Donald Trump’s presidential campaign.

2016-04-05

Cognitive Computing Market Forecast To Be Worth $31Billion In 3 Years

Cognitive computing will drive digital transformation and show explosive growth over the next few years.

2016-04-05

How The CIA Is Making Sense Of Big Data

The CIA’s new spying strategy is to make sense of big data, the technological explosion of connectivity, data sensors, devices & people.

2016-04-04

Who Is The Cybersecurity Guy In Your Organisation?

Cybersecurity is everyone’s responsibility, isn't it?

2016-04-04

Four Startup Companies That Are Harnessing AI In The Invisible Cyberwar

Examples of Cybersecurity startups working on automated systems they hope will be more effective than hiring human enterprise security teams.

2016-04-04

FBI Cancels Apple Court Hearing

The FBI has dropped the scheduled court hearing and showdown over its demands that Apple help unlock a terrorist’s iPhone.

2016-04-04

New Study Ranks Nations On Cyber Vulnerability

Data-mining experts have ranked the vulnerability of forty-four nations to cyberattacks and the results may surprise you.

2016-04-01

Apple's Questionable Victory Over the FBI

Apple has suffered one major casualty in its legal victory over the FBI: bragging rights over the iPhone’s security.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-04-01

Ex-CIA Chief: ‘If we don’t handle China well, it will be catastrophic’

General Michael Hayden turned the CIA into a militarised force. He now thinks the obsession with counter-terrorism obscures more serious threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications (Ultra I&C)

Ultra Intelligence & Communications provides critical, tactical capabilities that inform decision making in the most challenging environments.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.

Softcell Technologies Global

Softcell Technologies Global

Softcell is one of India's leading System Integrators. We serve enterprise customers in the areas of IT Security, Mobility, Optimised IT Infrastructure, Cloud and Engineering Services.

Southern Cyber

Southern Cyber

At Southern Cyber, our mission is to deliver world-class information security solutions that align businesses with leading security frameworks and compliance standards.