FREE TO VIEW


« Back to News

2015-08-14

France & UK on the Edge of Kafkaesque Surveillance

Are the surveillance tools that France and Britain are using too blunt and intrusive for modern democracies?

2015-08-14

HTC: Rendered Worthless By Insecurity?

Competition from above and below, combined with a shocking security lapse, knock HTC for six.

2015-08-14

US Internet Giants Join to Curb Child Sex Abuse

Facebook, Google, Microsoft, Twitter and Yahoo are doing the right thing.

2015-08-14

Darwinian Robotic Evolution

Artificial evolution of physical systems to create self-learning, improving robots.

2015-08-14

No. Petition to Pardon Snowden Rejected by Obama

The U.S.President and a majority of lawmakers maintain that Snowden must be prosecuted for violating the law.

2015-08-13

Artificial Intelligence Decodes ISIS

Artificial intelligence has been used to gain insights into the tactics of Islamic State.

2015-08-11

How To Avoid All-Out War in Cyberspace

The most cantankerous states in cyberspace tend to behave in a responsible manner because to act otherwise would invite terrible consequences.

2015-08-11

Inside the FBI Cyber Division

The biggest threats the FBI's new agents will face are not the ones they will confront on the streets, but the ones online.

2015-08-11

Will Robots Eliminate Many Humans From the Workplace?

The fear of millions of jobs being automated out of existence by robots is real. Here's how it will change the world -- for the better.

2015-08-10

The UK Government is Offering £5000 Cyber Secure Vouchers to SMEs

A campaign to improve understanding & cyber-strategy with a financial incentive scheme for SMEs adopting the right controls and solutions.

2015-08-10

Interpol is Training Police to Fight DarkNet Crime

Interopol run a five-day course on Tor hidden services, illegal marketplaces & crypto currencies to investigate crimes on the DarkNet.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

Schellman

Schellman

Schellman is a leading provider of attestation and compliance services.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Brightside AI

Brightside AI

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Velaspan

Velaspan

Velaspan design, deploy, and manage enterprise wireless networks and cybersecurity solutions for leading businesses and brands.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.

DuploCloud

DuploCloud

DuploCloud offers an end-to-end DevOps software platform for dev teams that don’t have dedicated DevOps engineers and augments those that do.