News

2016-05-10

Cyber "Best Practices" Are About To Change

The solution to our cyber crisis is not as difficult to understand as most people think. Opinion by Christopher Murphy

2016-05-13

Pentagon Wants to ‘Fingerprint’ The World’s Hackers

DARPA plans to track hackers to create “algorithms for developing predictive behavioral profiles,” linking malicious activity to individuals.

2016-05-10

Automated Malware Analysis Central to Defense Strategies

Research firm Forrester are hailing automated malware analysis as a big step forward in network security.

2016-05-12

No Phone Is Safe from Hackers & Spies

The illusion of privacy: Hackers only need your phone number in order to listen in on phone calls, read texts or track your geographic location.

2016-05-30

Pushing Back Sexism - A New Era For Women In Technology.

Women are challenging global technology companies and empowering themselves and each other to be safer online.

2016-05-10

CyberScape – The Growing Influence of Cyber Threats (£)

Cyber issues have entered most of the areas of any organisation’s systems and often, routine working methods and communications.

2016-05-10

Cyber Stalking: It's Real & Potentially Deadly (£)

When a “digital issue” became a real life danger.

2016-05-09

Cyber Revolution: A Big Step Change Business Leaders Need To Understand (£)

A revolution is taking place that compares to the Agricultural and the two earlier Industrial Revolutions and for many senior directors and strategic policy managers this has not yet been fully understood.

2016-05-10

Important IT Security Requirements For Business Leaders (£)

The implementation of cyber security skills and IT security departments have significantly increased in the last eighteen months and it has become an important issue that business directors and especially CEOs, Financial Directors and of course CIOs and IT Directors need to fully understand.

2016-05-09

US National Intelligence Director Says Snowden Hastened Encryption By 7 Years

James Clapper says Snowden has had an accelerator effect on commercially available encryption, making it much harder to track terrorists.

2016-05-09

Zuckerberg Thinks AI Will Know Everything About You.

Both Facebook and Google are pursuing machine learning technologies to take a deep look into what each user is posting, sharing & consuming

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

National Intelligence Service (NIS) - South Korea

National Intelligence Service (NIS) - South Korea

The NIS oversees policy on cyber security in South Korea by formulating and coordinating the execution of such policy and devising necessary schemes and guidelines.

Lynxspring

Lynxspring

Lynxspring provides edge-to-enterprise solutions and IoT technology for intelligent buildings, energy management, equipment control and specialty machine-to-machine applications.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

National Initiative for Cybersecurity Education (NICE) - USA

National Initiative for Cybersecurity Education (NICE) - USA

NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP (MIT ESP)

MillenniumIT ESP provides solutions and services around Core Infrastructure, Cloud, Cyber Security, Enterprise Applications, Intelligent Automation and Data, Smart Buildings, and Managed Services.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Aardwolf Security

Aardwolf Security

Aardwolf Security specialise in penetration testing to the highest standards set out by OWASP. We ensure complete client satisfaction and aftercare.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.