FREE TO VIEW


« Back to News

2016-03-22

AI Is Closer Than We Know…

Recent advances in technology make AI even closer to reality than most of us imagine.

2016-03-21

The Vocabularist: How We Use The Word ‘Cyber’

The prefix "cyber-" now denotes words to do with the Internet, although it has followed an eventful path to reach its modern meaning.

2016-03-21

Google's AI Wins Final Go Challenge

Google's DeepMind artificial intelligence has secured its fourth win over a master player, in the final of a five-match challenge.

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-21

Now Surveillance 'aggressive-invasive': Snowden

Edward Snowden, known for revealing the extent of surveillance by US intelligence, says it is "more aggressive and invasive today than it was before".

2016-06-24

'Brexit' Could Put Data Sharing in Jeopardy

A vote to leave and the passing of the IP Bill could see a ban on the transfer of data between the UK and EU. Opinion by Emily Taylor

2016-03-15

Hard Lessons From The Cyberattack On Ukraine

Investigation into cyberattacks that caused rolling blackouts in Ukraine reveal how vulnerable power suppliers are to malware.

2016-03-15

Russian Scientists Have Solved Light-Based Computers

High-performance microprocessors that harness photons rather than electrons promise to make computers up to a thousand times more efficient.

2016-03-14

Cybersecurity Skill Shortage Has Industry Worried

Years of massive hacker attacks on industry & government has led to a surge in cybersecurity jobs outpacing the supply of people to fill them.

2016-03-18

Fighting The Invisible War In CyberSpace

Cyberattacks can damage critical infrastructure, steal government secrets and even retaliate against private companies for political reasons.

2016-03-15

China’s Quantum Satellite Changes Cryptography

China is fast becoming a world leader in quantum communications technology.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Magnet Forensics

Magnet Forensics

Magnet Forensics' family of digital forensics products are used globally by thousands of law enforcement, military, government and corporate customers.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

Softtek

Softtek

Softtek helps its clients to gain a competitive edge by implementing digital solutions that propel their business strategies.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Cybersixgill

Cybersixgill

Cybersixgill was founded with a single mission: to protect organizations against malicious cyber attacks that come from the deep and dark web, before they materialize.

National Security Authority (NBU) - Slovakia

National Security Authority (NBU) - Slovakia

The National Security Authority (NBU) is the central government body in Slovakia for the Protection of Classified Information, Cryptographic Services, Trust Services and Cyber Security.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

OwnZap Infosec

OwnZap Infosec

OwnZap Infosec aims to digitally shield the cyberspace by offering services like Penetration Testing and Red Teaming, Infrastructure Security Testing, and Vulnerability Assessments.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

Synechron

Synechron

Synechron is a leading global digital consulting firm, providing innovative technology solutions for business.