FREE TO VIEW


« Back to News

2015-10-23

Cyber Wars Won't Replace or Trigger Traditional Wars

A cyber war is not capable of triggering a traditional war nor has the ability to replace it in the near future. So says US Foreign Policy guru.

2015-10-23

Cybersecurity Firm Illusive Protects by Deception

Sometimes the best way to protect data is to make it appear as vulnerable as possible.

2015-10-21

Technology Will Transform Human Expertise

A new book by Richard & Daniel Susskind predicts the decline of today's professions & describes the systems that will replace them.

2015-10-20

Deep Web – CyberCrime, The Movie

A new documentary film gives the inside story of the arrest of Ross William Ulbricht, the man behind Silk Road cybercrime website.

2015-10-21

America Dominates Drones

The business of military drone-building is booming.

2015-10-23

The World's First Hack: the Telegraph and the Invention of Cyber Privacy

Concern over personal data interception did not start with GCHQ and the NSA, hacking can be traced all the way back to the 19th century

2015-10-23

What’s The Value Of Your Data?

Data has become a strategic asset that allows companies to acquire or maintain a competitive edge.

2015-10-21

US Concerns Over Kremlin Links to Cyber Gangs

Moscow has long been known to source its technology, world-class hacking talent and intelligence information from cyber crime rings.

2015-10-21

Robots Replace White Collar Jobs as Well

Professional duties that we see as distinctly human could soon be carried out by AI

2015-10-21

The Jobs Robots Will Take First…

The debate about whether machines will eliminate the need for human employment is no longer just academic.

2015-10-21

Russia - NATO Cyber War Heats Up

Cyberattacks have become far more aggressive and numerous since NATO and Russia recommenced hostilities with each other.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Athena Forensics

Athena Forensics

Athena Forensics is one of the UK's leading providers of Computer Forensics, Mobile Phone Forensics, Cell Site Analysis and Expert Witness Services.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Security & Intelligence Agency (SOA) - Croatia

Security & Intelligence Agency (SOA) - Croatia

SOA is the Croatian security and intelligence service. Areas of activity include Cyber Security and Information Security.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

ZEBOX

ZEBOX

ZEBOX is an international incubator & accelerator of innovative startups. Focus is on Transport/Logistics and Industry X.0 including technologies such as AI, Blockchain and Cybersecurity.

Kinnami Software

Kinnami Software

Kinnami is a data security company that equips organizations with the tools they need to secure and protect highly confidential documents and data.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

IPKeys Cyber Partners

IPKeys Cyber Partners

IPKeys Cyber Partners, together with the IPKeys Power Partners unit, provide Cyber Security and CIP Compliance for utilities, grid operators and public safety organization across the USA.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Patero

Patero

Patero provides cybersecurity technology solutions that make your data indecipherable with quantum-safe encryption.