News

2021-03-26

FBI 2020 Online Crime Report

The FBI says that the top three crimes reported by victims in 2020 were phishing scams, non-payment/non-delivery scams and extortion.

2021-03-26

Trump is Planning A Social Media Return

Following a permanent ban on Twitter and Facebook, Donald Trump will launch his own social media platform to express his views.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-24

Secure Your Personal Email & Social Media Accounts

Social Media Hacks: Facebook, Instagram and Snapchat were the most reported platforms on which people had their accounts compromised.

2021-03-24

Britain's Cyber Force Toughens Up

The National Cyber Force is being assembled to ‘detect, disrupt and deter’ adversaries as a key part of a new fully-formed British cyber strategy.

2021-03-24

2021 Blockchain Trends

Faster transactions, transparency and the absence of intermediaries, all mean that blockchain will become a dominant technology in many industries.

2021-03-23

The Iran-Russia Cyber Agreement & US Strategy In The Middle East

Cyber cooperation between Moscow and Tehran, while essentially defensive in nature, could pose several challenges to US cyber operations.

2021-03-23

British Companies Compromised By Exchange Email Hacking

Hundreds of UK company email servers have been hacked in the Microsoft Exchange breach and many are not even aware they are victims.

2021-03-22

Cyber Security For US Weapons Systems Criticised

Audit Report: Of the five branches of the US military, only the Air Force is taking the cyber security of critical weapons systems seriously.

2021-03-22

Is Blockchain The Future Of SSL Certificates?

Crypto exchanges must ensure they secure their networks and the primary method is to install an SSL certificate. Blockchain might help with that.

2021-03-22

Focused Security Analysis For Your Organisation’s IT Systems

CENSUS helps clients with the cybersecurity journey by providing end-to-end, state-of-the-art assessment of their customers security posture.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

CyberFortress

CyberFortress

CyberFortress is an insuretech startup offering a new kind of online business interruption policy designed for small business.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

CleanCloud by SEK

CleanCloud by SEK

CleanCloud by SEK is a CSPM product focused on public cloud data protection and security regulations, with over 400 compliance checks for the market's leading frameworks and regulations.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

risk3sixty

risk3sixty

Risk3sixty are information and cyber risk management craftsmen helping build business-first security and compliance programs.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.