News

2015-10-06

AI - Reshaping the Workplace

AI-powered business applications will automate jobs, rather than just a task and the the effects will ripple across organizations.

2015-10-06

Russian Scientists Create Cockroach Robo-Spy

RoboRoach: Biologically inspired engineering to create an artificial organism which can be operated using a mobile app.

2015-10-06

Medical Devices Vulnerable to Hackers

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online.

2015-10-07

Cyber Attacks Cost Business Over $300bn Worldwide Last Year

Research from Grant Thornton reveals that cyber attacks are taking a serious toll on business.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-10-05

India Discusses Cyber 9/11 Prevention

India is worried that it's Banking, IT & Service sectors are vulnerable to the threat of serious cyber attacks.

2015-10-02

U.S & China Talk Truce But Cyber War Remains

James Clapper, Director of National Intelligence, tells U.S Senate hearing on cybersecurity that he is not optimistic about the agreement.

2015-10-05

Integrating Video Analytics Technologies At Airports.

There is a critical need for finding solutions for more advanced security in airports.

2015-10-02

Karma Police: From Radio to Porn, British Spies Track Web Users’ Online Identities

There was a simple aim at the heart of the top-secret program: Record the website browsing habits of “every visible user on the Internet.”

2015-10-02

Edward Snowden Joins Twitter & Follows NSA

His opening tweet was: "Can you hear me now?"

2015-10-02

Social Media and the 'Information War’- Russia is Winning

The Kremlin wields a vast media apparatus to distort information, promote conspiracy theories & obfuscate observers about the crisis in Ukraine.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

National Security Agency (NSA) - USA

National Security Agency (NSA) - USA

NSA is a US intel agency responsible for the protection of government communications and information systems against penetration and network warfare.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Secrutiny

Secrutiny

Scrutiny's core services include Cyber Maturity, Cyber Risk Analyser, Cyber Controls, Incident Response, SOC, Cyber Recovery and Assurance Testing.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Attura

Attura

Atturra is one of Australia's leading advisory and IT solutions providers, focused on providing end-to-end transformation services to its clients.

Cytomate

Cytomate

Cytomate is an AI-powered cybersecurity company specializing in security posture management and innovative threat intel.