FREE TO VIEW


« Back to News

2015-08-03

Nonstop Cyber Attack - Israel Builds Hack-Proof Defense

Israel is the second most hacked country in the world. Here's what they're doing about it.

2015-07-31

UK MPs are No longer Exempt from Surveillance

James Eadie QC tells Investigatory Powers Tribunal the Wilson doctrine is unworkable in the era of bulk interception.

2015-07-30

Fear Killer Robots

Autonomous weapons could shape a better world, one in which the fog of war thins, if ever so slightly.

2015-08-03

In The War of 2050, The Robots Call The Shots

The future of war belongs to the bots. Probably led by some enhanced humans.

2015-07-30

Giant OPM Data Hack Did Blow U.S. Spies’ Cover

Not Just Social Security Numbers: more than one million fingerprints were stolen in U.S Federal Personnel data Hack.

2015-08-03

Don't Make These IT Mistakes in Your Organisation

Where dysfunctional rhythms and routines are the law of the land.

2015-08-06

Stagefright: New Android Vulnerability Dubbed 'heartbleed for mobile'

An attacker can take over the vast majority of Android phones with just a text message.

2015-08-03

Can You have Both Security & Privacy in the Internet Age?

Opinion By Anja Kaspersen: Head of Geopolitics & International Security at the World Economic Forum.

2015-07-29

Germany's New Infrastructure Cybersecurity Law

Federal agencies & providers of essential public services will have to comply with minimum standards of cyber-security.

2015-07-28

The BYOD Debate is Not Over

Most workers use personal mobile phones for work tasks, often outside of work hours.

2015-07-28

Hacking Team Inside Job

Italian police are investigating whether the attack on cyber-espionage firm Hacking Team could have been an inside job.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Menlo Security

Menlo Security

Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

Wisr AI

Wisr AI

Wisr AI helps enterprises assess not only their own internal Cyber Risk posture, but also helps prioritize the inherent risk faced through 3rd party infrastructure and supply chain connections.