News

2015-09-14

Are We Really Safe From Self-Aware Robots?

Hey, Siri. Suddenly, those apocalyptic predictions about killer robots seem less crazy.

2015-09-21

How Companies Are Fighting Off Spies and Hackers

Two years since Snowden leaked details of massive covert surveillance operations, what is business doing to defend against spies & hackers?

2015-09-11

IoT Will Change Your Relationship With Insurance

You + IoT + Provider = A New Dialogue

2015-09-11

JPMorgan Hires Former U.S Army Cyber Chief

Put Down That Gun & Pick Up a Pay Rise: Odierno Wears Pinstripes.

2015-09-11

Firm That cleared Edward Snowden Will Pay NSA $30m Damages

Big Mistake: Private firm that vetted Edward Snowden for security clearance to work for the NSA will pay compensation.

2015-09-09

Anonymous Launches Cyber-Attacks Against ISIS

Hacktivists are targeting and attacking the online network of supporters & suspected websites of ISIS.

2015-09-08

US Intelligence Keys in on the Russian ‘Troll Army’ Manipulating Social Media

False Open Sources: US Intelligence thinks that Russia is skilful at using social media to generate propaganda.

2015-09-09

Snowden Has No Plans to Leave Russia

His lawyer says it's all fine and dandy in Moscow, although Edward Snowden is not considering applying for Russian citizenship. Yet.

2015-09-09

Humans Should Ban Artificially Intelligent Weapons

Manufacturers & governments developing lethal AI weapons claim proper safeguards can be engineered. We doubt it.

2015-09-09

MH370 Gentle Landing Theory

Opinion By OliverMcGee

2015-09-08

Hackers Target Saudi Government Websites

Over 24 Saudi government websites have been hacked despite the fact that the hackers gave advance warning.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Gigacycle

Gigacycle

Gigacycle is one of the leading IT disposal and recycling providers in the UK. We specialise in IT asset disposal (ITAD) and data destruction.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

Capital Network Solutions

Capital Network Solutions

Capital Network Solutions are a highly accredited managed IT services and consultancy provider, specialising in cyber security, infrastructure and communications.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

IT Voice

IT Voice

IT Voice specializes in Managed IT and VoIP solutions. Our focus is simplifying the technology so our customers can stay focused on what they do best.