FREE TO VIEW


« Back to News

2015-03-18

Some Email Truths for Hillary Clinton

One thing the US Presidential candidate should know is that armed guards aren’t really equipped to stop a data breach.

2015-03-18

The Internet Of Things TransForms Three Industries!

How the Internet of Things (IoT) can make our day-to-day activities more comfortable, productive and efficient.

2015-03-18

Europe Could See Beginning Of Two-Tier Internet

EU Politicians are planning a two-tier Internet in Europe

2015-03-13

CIA 'tried to crack security of Apple devices'

US spy agency tried to create dummy version of development software that would allow it to insert surveillance back doors into apps.

2015-03-17

GCHQ Spying Wasn't Illegal, it Just ‘Lacked Transparency’…

UK data surveillance programs, including the bulk collection of data from ISPs, have been declared legal by a parliamentary committee.

2015-03-08

How do we police the digital age?

Opinion by Giles Herdale - Essex Police National Lead on Digital Intelligence & Investigation Strategy.

2015-03-08

The Dark Web: anarchy, law, freedom and anonymity

The Deep Web is of intense interest to people who want to avoid government spies and law enforcement.

2015-03-10

Private Equity and Cyber Security: The 3 Weak Points

Private equity COOs and managing partners should consider the three main areas of the private equity business model that are susceptible to cyber attack:

2015-03-09

How you could become a victim of cybercrime in 2015

Cybersecurity experts' predictions for the year ahead:

2015-03-10

The Future of Government Surveillance - Looks Like This

Modern targeted surveillance is likely to involve actively breaking into an adversary's computer network and installing malicious software.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

CyberASAP

CyberASAP

CyberASAP provides expertise, knowledge and support to convert academic ideas into commercial products in the cyber security space.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Raiven Capital

Raiven Capital

Raiven Capital is a global early-stage technology venture capital fund. We focus on founder-led, driven companies on the leading edge of disruption.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

RightSec

RightSec

RightSec is an emerging market leader and solution provider for cybersecurity and digital resiliency. We provide end to end solutions to suit your specific business lifecycle.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.