FREE TO VIEW


« Back to News

2015-03-29

Crime has gone High-Tech and the Law Hasn’t

Everthing is connected, everyone is vulnerable, and what we can do about it....

2015-03-30

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has acknowledged that its intelligence community have specialized units for waging cyber-war.

2015-03-26

You Can Tell Which Emails are Being Tracked.

You may not have heard of companies like Yesware, Bananatag, and Streak, however they almost certainly know a good deal about you.

2015-03-26

Drones: The Looming Threat

Unmanned aircraft, otherwise known as drones, are becoming common.

2015-03-26

Connected Cars: Risks for Automated Vehicles.

Every day more devices are being connected to the Internet and connected cars are growing in number.

2015-03-26

5 Essential Truths of The Internet Of Things

The Internet of Things (IOT) really will bring about a total paradigm shift, enabling instant sharing of real-time information.

2015-03-26

Amazon Gaming Site Hacked

Amazon.com Inc.’s video game streaming site Twitch Interactive Inc. is requiring users to reset their passwords following a suspected hack.

2015-03-24

US Loses Contact with Drone Aircraft in Syria

An unarmed US Predator drone aircraft went down in Syria, but it's not clear whether it was shot down as claimed by the Syrian government.

2015-03-24

FBI Plans to Expand its Hacking Powers

A US judicial advisory panel quietly approved a rule change that will broaden the FBI’s hacking authority despite fears of a “monumental” constitutional concern.

2015-03-24

Self-driving Cars May Lead to Human Driver Ban

Self-driving cars are "almost a solved problem," says Elon Musk.

2015-03-24

UK Police Should Retry Gun Technology Sensors

ShotSpotter promises to save police having to hunt door-to-door in the vague vicinity of gunfire.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Crosspring

Crosspring

Crosspring is an incubator/accelerator for people who have the ambition to start a successful business or want to extend their existing business in the areas of FinTech, AR, VR, Cybersecurity and SaaS

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

Senteon

Senteon

Senteon is a turnkey cybersecurity platform designed to make securing confidential data affordable, understandable, and streamlined for small-to-mid sized businesses and MSPs.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.

Corporater

Corporater

Corporater provides organizations with integrated solutions for managing governance, performance, risk, and compliance built on a single platform.