News

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

2018-02-20

Crypto-Mining Is A Growing Epidemic

Cryptocurrency mining presents a real threat to businesses, with nearly 25% of organisations worldwide affected by Coinhive malware.

2018-02-20

A Search Tool That Allows Anyone To Access Cloud Documents

Buckhacker is a hacking tool that trawls unsecured cloud server platforms. Companies using them are at risk of losing control of their data.

2018-02-20

Discover Your Inner Spy

Spyscape: New York has a new museum, designed by a British intelligence officer, giving visitors a taste of life as a secret agent.

2018-02-19

What Do CISOs Prioritise To Improve Cybersecurity?

As security has increasingly become a concern for financial institutions, the role of the CISO has been thrust into the organisational spotlight.

2018-02-19

What Does The US Air Force Want From AI?

Amongst other things, the answer is the capability to shoot someone in the face from 200 Kilometers away.

2018-02-19

Facebook Personal Data Use & Privacy Settings Ruled Illegal

German court rules that Facebook collects and uses personal data without providing enough information to users for them to give meaningful consent.

2018-02-19

Bitcoin Energy Use In Iceland Soars

Making Money: Electricity use at Bitcoin mining data centres located in Iceland is likely to exceed the energy consumption of all the nation's homes.

2018-02-19

UK Blames Russia For NotPetya Cyberattack

UK Defence Minister accuses the Russian government of “undermining democracy” with a cyberattack targeting Ukraine and spread across Europe.

2018-02-16

Facebook Enables 'Fake News'

Digital Deceit: More people are coming to the conclusion that social networking is an overall negative for society.

2018-02-16

Chinese Healthcare Technology Moves Ahead

The big tech firms like Alibaba and Tencent have made delivering better healthcare a priority and are more ambitious than their international peers.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

Cloud Managed Networks

Cloud Managed Networks

Cloud Managed Networks provides enterprise grade IT network solutions for cloud-based and on premise network security, Wi-Fi, data switching, collaboration, device management and more.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Cyber Security & Cloud Expo

Cyber Security & Cloud Expo

The Cyber Security & Cloud Expo is an international event series in London, Amsterdam and Silicon Valley.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

Talon Cyber Security

Talon Cyber Security

Talon delivers the leading enterprise browser designed to bring security to managed and unmanaged devices, regardless of location, device type or operating system.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Lucata

Lucata

Lucata solutions support groundbreaking graph analytics and improved machine learning for organizations in financial services, cybersecurity, healthcare, pharmaceuticals, telecommunications and more.

BetterWorld Technology

BetterWorld Technology

BetterWorld Technology provides cloud solutions, managed services, SaaS, cybersecurity and virtual CIO, all customized to meet your needs.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.