News

2017-07-26

Key Concepts For Understanding Artificial Intelligence

AI has innovative uses across all industry segments, helping diagnose and solve problems faster and enabling consumers to do amazing things.

2017-07-26

US Steps Up Its Cyberwar Capability

The NSA and Cyber Command to separate, reforming the chain of command for defensive & offensive cyber operations to combat IS and other foes.

2017-07-26

Australia Wants Technology Businesses To Act On Extremism

Australian PM tells Internet companies to move faster to remove extremist content and to address the “problem” of encrypted messages.

2017-07-26

Predicting Crime From Open Source Data

The criminal justice system produces reams of data and a new crime prediction technology is being deployed that is transforming policing.

2017-07-25

Can We Stop Algorithms Telling Lies?

Most important moments where people interact with large bureaucratic systems involve an algorithm in the form of a scoring system. That's a problem.

2017-07-24

Global Cyber Attack Could Cost $53Billion.

Insurance experts at Lloyds calculate that the cost of a major cyber attack would equal the economic losses from a catastrophic natural disaster.

2017-07-24

Dark Web Marketplaces Shut Down

AlphaBay and Hansa, two of the largest “dark web” marketplaces for illegal and illicit items such as drugs and guns, have been shut down.

2017-07-25

Cyber Warfare Takes A New Turn

The recent ransomware attacks are masking a bigger issue in cyberwar - which is that chaos and disruption on the Internet are the new normal.

2017-07-25

The Impact Of AI On Employment Demands New Thinking

The challenge of protecting traditional jobs from the impact of globalisation will be further complicated by the effects of AI and automation.

2017-07-19

US Needs To Get Its Data Ready For GDPR

The GDPR harmonises data privacy laws, empowers EU citizens’ data privacy and will reshape organisations' approach to data privacy.

2017-07-25

Guide to Russian Infrastructure Hacking

Which of the numerous Russian hacker groups has been attempting to hack the US power generation infrastructure?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Windscribe

Windscribe

Windscribe is a Virtual Private Network services provider offering secure encrypted access to the internet.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Sri Lanka CERT

Sri Lanka CERT

Sri Lanka CERT is the National Centre for Cyber Security, which has the national responsibility of protecting the nation’s cyberspace from cyber threats.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

MadWolf Technologies

MadWolf Technologies

MadWolf’s mission is to deliver enterprise-quality managed services and focused applications to organizations operating in the non-profit, association and international development sectors.