FREE TO VIEW


« Back to News

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

2015-08-04

Data Breaches Boost Funding for Cybersecurity Startups

In the first half of 2015 venture firms invested $1.2 billion in cybersecurity startups.

2015-08-04

SurfWatch Labs Rolls Out Dark Web Intelligence Service

SurfWatch collects sensitive cyber intelligence from the underground on threats relevant to a specific customer.

2015-08-04

Machine 2 Machine: Where will that leave us?

When machines communicate directly with each other without a human intermediary – will they prefer their own company?

2015-08-04

ISIS's Threat: A Cyber War Against America

ISIS has over 20,000 English-language Twitter followers "that...makes it harder to determine who's going to succumb to the propaganda."

2015-08-04

3D Xpoint Memory: Faster-than-flash Storage

3D Xpoint is a type of "persistent memory" - meaning it retains data stored on it when the power is switched off, unlike RAM.

2015-08-04

For Ransom, Bitcoin Replaces the Bag of Bills

Criminals like the virtual currency because it can be held in a digital wallet & is not registered with any government or financial authority.

2015-08-04

Google Gives Customers Control of Encryption Keys

Google launched “bring your own encryption” keys for use on its Cloud Platform.

2015-08-04

Identity Access Management: Lessons From JPMorgan’s Insider Breaches

Another JPMorgan Chase & Co. employee arrested on charges of stealing customer data & trying to sell it for thousands of dollars.

2015-08-04

Disclosure: Internet companies Face UK Tax Crackdown

Internet companies may have to disclose information on people & businesses that sell goods and services online.

2015-08-03

Darkcode Hacking Forum Forced Offline

A notorious hacking forum used by Lizard Squad & other cybercriminals has been shut down after a police investigation in 20 different countries.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

Galvanize

Galvanize

Galvanize is a leading provider of award-winning, cloud-based security, risk management, compliance, and audit software for some of the world’s largest organizations.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Cybercrime Investigation & Coordinating Center (CICC) - Philippines

Cybercrime Investigation & Coordinating Center (CICC) - Philippines

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Thoma Bravo

Thoma Bravo

Thoma Bravo is a leading private equity firm with a 40+ year history and a focus on investing in software and technology companies.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.

Armilla AI

Armilla AI

Armilla is the world’s only MGA focused solely on AI insurance and offers third-party testing, compliance, risk mitigation, and warranty coverage for enterprises and AI vendors alike.