News

2021-06-11

Equality Goes Missing In The Digital Industry

Women are less likely than men to have specialist digital skills or work in digital technology and are poorly represented in senior leadership jobs.

2021-06-10

Closing The Space Between Cybercrime & Cybersecurity

Failing to understand the intersection between the threats posed by cybersecurity and cybercrime leaves blind spots wide open to exploitation.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-06-09

The Cyber Revolution’s Effects on International Trade

Digital connectivity is transforming the ways nations trade. It also enables Modern Slavery, Digital Piracy and growth in Cyber Crime (£).

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

2021-06-08

Identifying & Minimizing Security Vulnerabilities For Your Organization

Despite the very best security efforts, small flaws in cyber security architecture can pose a great threat to business assets and operations.

2021-06-07

Fake Finance Apps Focus On Theft

Fake banking, trading and crypto-currency apps are being used by criminals to steal money and financial information from unsuspecting users.

2021-06-07

Microsoft’s Defensive Playbook

Microsoft is offering a series of incident response ‘playbooks’, giving advice to business leaders on how to defend against cyber attacks.

2021-06-07

Russian Hackers Targeting International Aid Groups

Intelligence Gathering Effort : An estimated 3,000 email accounts at more than 150 different organisations have been attacked this month.

2021-06-07

Huawei Chooses UAE As Cyber Security Hub

Huawei is helping UAE to establish Smart City and e-governnent infrastructure to create a "globally trusted digital oasis” safe from cyber threats.

2021-06-07

US Media Group In Latest Ransom Attack

Live streams for radio and TV stations owned by the Cox Media Group have been knocked offline in an undisclosed ransom attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Unciphered

Unciphered

Unciphered was created as the first company providing services for opening locked hardware cryptocurrency wallets.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

AUCyber

AUCyber

AUCyber is a leading provider of managed cyber security solutions and consultancy services, specialising in supporting Australian organisations and Government agencies.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.