News

2017-08-25

Tech Giants Put Big Data To Work

The most important aspect of big data is it’s ubiquity throughout the market and availability to all businesses, large and small.

2017-08-22

Hackers Target The Shipping Industry

The shipping industry is now painfully aware that physical shipping operations are vulnerable to digital disruption.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-29

Android Apps With Spy Software

Security researchers warn against using certain phone messenger applications which have the capability to steal data from the devices they infect.

2017-08-22

Very Few UK Girls Took Computing A-level

A worrying statistic for the tech industry: In freshly-released A-level data, only 9.8% of those completing a computing course were girls.

2017-08-21

4 Steps Toward A GDPR Compliance Audit

Many organisations are starting to feel stressed and perhaps a bit confused by the General Data Protection Regulation. Here's where to start.

2017-08-24

Organisations Need A Data Ethics Strategy

“Data ethics” can give companies a competitive edge by protecting personal data, especially when their target customers value social responsibility.

2017-08-23

The “augmented human” Concept Becomes Reality

We carry health sensors on our wrist, and our Apple Watch is becoming our personal physician. These concepts are transforming the insurance industry.

2017-09-01

A Robot Won’t Steal Your Job Just Yet…

The technology industry likes to talk about how automation is set to change the world. But amid all the futurism, one thing gets lost: actual robots.

2017-09-01

The AI Apocalypse

Adversarial attacks are an increasingly worrisome threat to the performance of artificial intelligence applications.

2017-08-24

Firms Underrate The ‘Seismic Aftershock’ Of An Attack

UK businesses are overconfident in their cybersecurity planning & underestimate the damage of the “seismic aftershock” following a breach.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Digitronic Computersysteme

Digitronic Computersysteme

Digitronic focus on innovative software to protect your personal and sensitive corporate data.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

Redwall Technologies

Redwall Technologies

Redwall provides cybersecurity expertise and technology to prevent and respond to emerging threats against mobile applications and connected infrastructures.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Sentrium Security

Sentrium Security

Sentrium is committed to helping organisations protect their technology, information and people. Our range of bespoke services provide solutions to tackle a broad range of cyber security challenges.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

Radius Technologies

Radius Technologies

Radius Technologies is trusted by progressive SMEs to deliver world-class cloud, IT solutions, IT and data security, and telecoms systems.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.