FREE TO VIEW


« Back to News

2017-08-07

Police Can’t Reduce Cybecrime

The number of prosecutions for cybercrime fell in the UK last year as under-resourced police struggle to tackle the growing security threat.

2017-08-07

The Dark Web Goes Corporate

Guns. Drugs. Porn. Almost anything you want is available from a host of vendors, all of whom are competing for buyers on quality & service.

2017-08-04

5G Wireless Technology - Enabling Mobile-Only Networking

5G is about the evolution of cellular from wireline augmentation to wireline replacement, and strategically from mobile-first to mobile-only.

2017-08-02

CIA Malware Unveiled

Wikileaks' latest release of CIA secret exploits include previously unknown malware developed by major US defence contractor, Raytheon.

2017-08-03

Data Scientists Remain Top Of ‘most wanted’ Employees

Data science is revolutionising every industry, from finance to healthcare, media to advertising, the start-up world to global corporates and the pay is good.

2017-08-04

N. Korea Threatens The World With Cyberwarfare - Not Nuclear Missiles

For a country that’s as “off the grid” as you can get, North Korea is remarkably plugged in to cyberwarfare.

2017-08-07

US Tries To Keep Up with Terrorists Tech

Terrorists are striving to use unmanned systems, especially airborne platforms, to deploy new threats. The US military is racing to keep up.

2017-08-03

Microsoft Cloud Earnings Beat Expectations

There's a reason Microsoft founder Bill Gates is still the richest man in the world and it's not because of PCs & software. It's all about the Cloud.

2017-08-03

Cyberterrorism: The Next Threat From Islamic State

While powerful hacking tools are readily available to purchase on the dark web, a combination of cybercrime and jihadism is a likely future threat.

2017-08-01

Why We Need a Transatlantic Charter for Data Security and Mobility

Common guidelines for data flows are crucial to protect the goods & services that depend on big data and to support productivity gains.

2017-08-01

Moneysupermarket.com Spammed 7 Million

UK rules on direct marketing emails are more strict than widely thought, as Moneysupermaket.com and Morrisons supermarkets have discovered.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

KoolSpan

KoolSpan

KoolSpan’s security and privacy solutions address the growing threat of loss or theft of intellectual property, information, and proprietary assets.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Secret Intelligence Service (SIS - MI6) - UK

Secret Intelligence Service (SIS - MI6) - UK

The UK’s Secret Intelligence Service, also known as MI6, has three core aims: stopping terrorism, disrupting the activity of hostile states, and giving the UK a cyber advantage.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.