FREE TO VIEW


« Back to News

2015-10-12

Reinventing CIA for the Big Data Era

The CIA has a new Directorate for Digital Innovation to deal with turning the vast amounts of data the agency collects into useful insights.

2015-10-12

Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer says social media firms are putting lives at risk by refusing to co-operate with investigations.

2015-10-15

UK Police Ignore Most Cyber Crime

Around 70 per cent of all frauds are carried out online, with many criminals based overseas - making it difficult for police to pursue a case.

2015-10-12

Global Nuclear Facilities 'at risk' of Cyber Attack

The civil nuclear infrastructure in most nations is not well prepared to defend against attack.

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-09

Safe Harbour No More. Facebook Data Transfer Deal Is Ruled Invalid

EU Court of Justice rule the 'Safe Harbour' agreement that companies have relied on to move personal data across the Atlantic is invalid.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

The Rules of Cyberspace Just Got A Bit Clearer

United Nations has made recommendations guiding state activity in cyberspace which break new ground.

2015-10-07

Where’s The Money in Data?

How do we use data to drive revenue?

2015-10-12

Cyber Insurance Policies: Worth the Money?

The global cyber insurance market is expected to triple in size, reaching an estimated $7.5 billion in annual premiums by the year 2020.

2015-09-18

Bitcoin Made Official by US Trade Commission

The US Commodity Futures Trading Commission has ordered that bitcoin be treated as an official commodity and regulated accordingly.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

OSIRIS Lab - NYU Tandon

OSIRIS Lab - NYU Tandon

The Offensive Security, Incident Response & Internet Security Lab (OSIRIS) is a security research environment where students analyze and understand how attackers take advantage of real systems.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

RecoLabs (Reco)

RecoLabs (Reco)

Reco empowers organizations to discover their SaaS applications, identities, and data, control access and prevent the risk of exposure.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.