News

2016-09-23

Terror Threat In 2016 Worse Than 2001

Fifteen years after the 9/11 attack, the battle against terrorism is far from over. The threat today is worse than the one confronted in 2001.

2016-09-22

Are Cyber Breaches The New Norm?

Normal: The first half of 2016 saw 538 known breaches; 60 percent of businesses losing valuable IP and approximately 13m records exposed.

2016-09-21

Social Media Sites - Cyber Weapons of Choice

Facebook, LinkedIn and Twitter can't secure their own environments, let alone yours. It's time to sharpen your security know-how.

2016-09-21

How Will Terrorists Use The Internet of Things?

What is the future for the IoT, when smart refrigerators can be used in DDOS attacks and LED lightbulbs can communicate?

2016-09-21

Tesla Announces Update To Self-Driving System

Tesla is updating its semi-autonomous driving system Autopilot with new limits on hands-off driving.

2016-09-21

A New Autonomous Tactical Drone

No Pilot. No GPS: The drone flies into a building and autonomously maps its interior using cameras, lasers, inertial & ultrasonic sensors.

2016-09-20

Special Report: CEOs And IT Innovation (£)

SPECIAL REPORT: CEOs And IT Innovation Our CEO/CIO research exposes some of the significant transformation issues organisations are facing in the new Digital Economy.

2016-09-21

You Have Big Data, Or Perhaps Just Too Much Data?

There is more data available to organisations today than ever before. Is it all really useful?

2016-09-20

FBI: Don’t Pay Bitcoin Ransomware

The FBI has reversed its advice on paying ransomware. The agency now says people should refuse to pay bitcoin extortionists.

2016-09-20

Cloud-Based Malware Now Delivers Ransomware

Concerns over ransomware are growing and a new study finds that nearly half of all cloud-based malware now delivers ransomware applications.

2016-09-20

UK To Examine Phone Surveillance In Prisons

Its surprising that surveillance and tracking of mobile phone users in UK prisons has not been adopted earlier.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Logically Secure

Logically Secure

Logically Secure provide penetration testing and security assessment services.

KvantPhone

KvantPhone

KvantPhone (formerly CryptTalk) is an easy-to-use, quantum resistant secure communication service designed for businesses and large organizations.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

DTS Solution

DTS Solution

DTS Solution delivers advanced cyber security solutions through is technology partnerships with industry leading security vendors and advanced consulting services.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

ISTC Foundation

ISTC Foundation

ISTC Foundation is one of the leading innovation centers in Armenia, founded by joint initiative of IBM, USAID, Armenian Government and Enterprise Incubator Foundation.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.