FREE TO VIEW


« Back to News

2015-09-15

Tor Gets Help to Anonymise Users of 'dark web'

Two proposals have won approval from key Internet bodies that will limit how widely information is shared about sites hosted on Tor.

2015-09-21

Over 90% of UK Police Requests to Access Calls & Emails Are Granted

Campaigners find British Police were making a request every two minutes and getting access in 93% of cases.

2015-09-17

Cyber Threat: First Data Theft - Next Data Manipulation

US intelligence chiefs warn the next phase of escalating online data theft will involve the manipulation of digital information.

2015-09-14

Autonomous Submarine Drones: A Threatening New Weapons Platform

Smart naval robots could make for very choppy waters in places where the U.S, Russia and others have competing interests.

2015-09-14

Top Risk Management Concerns: Survey Results

Companies’ fears regarding cyber threats are significant, including hacking incidents, information theft. loss of network & website access.

2015-09-14

Are We Really Safe From Self-Aware Robots?

Hey, Siri. Suddenly, those apocalyptic predictions about killer robots seem less crazy.

2015-09-21

How Companies Are Fighting Off Spies and Hackers

Two years since Snowden leaked details of massive covert surveillance operations, what is business doing to defend against spies & hackers?

2015-09-11

IoT Will Change Your Relationship With Insurance

You + IoT + Provider = A New Dialogue

2015-09-11

JPMorgan Hires Former U.S Army Cyber Chief

Put Down That Gun & Pick Up a Pay Rise: Odierno Wears Pinstripes.

2015-09-11

Firm That cleared Edward Snowden Will Pay NSA $30m Damages

Big Mistake: Private firm that vetted Edward Snowden for security clearance to work for the NSA will pay compensation.

2015-09-09

Anonymous Launches Cyber-Attacks Against ISIS

Hacktivists are targeting and attacking the online network of supporters & suspected websites of ISIS.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Bastille

Bastille

Bastille’s patented software and security sensors bring visibility to devices emitting radio signals (Wi-Fi, cellular, IoT) in your organization.

Cybercrypt

Cybercrypt

Cybercrypt is a world leading system provider in robust cryptography. Protecting critical assets, applications and sensitive data.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

The Aerospace Corporation

The Aerospace Corporation

The Aerospace Corporation is playing a key role in advancing space cybersecurity through innovative prototypes that can quickly detect and mitigate cyber threats.

CyberGuardPro

CyberGuardPro

CyberGuardPro is a premier cybersecurity firm that prioritizes safeguarding businesses and individuals from the evolving landscape of digital threats.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.

TrustFour

TrustFour

TrustFour is a pioneer in workload and non-human identity security, providing innovative solutions for compliance, remediation, post quantum resiliency, and advanced threat defense.

GrabDefence

GrabDefence

GrabDefence enables digital businesses to thrive by safeguarding their ecosystem against fraud risk, digital identity threats and compliance challenges.