News

2020-10-07

Australia Wants Google & Facebook To Pay For News

As Big Tech resists calls for greater regulation, Australia will compel Google and Facebook to pay for news content provided by media publishers.

2020-10-09

Iranian Government Hackers Spy On Dissidents

An Iranian hacker group has spied on Iran’s government political opponents for years by exploiting stolen 2 Factor Authentication codes.

2020-10-06

Facebook Too Slow At Removing Fake News

A recently fired Facebook employee has denounced the company’s handling of misinformation and election interference.

2020-10-05

Organisations Must Use Cyber Security Tools For Remote Working

Remote working is the new normal for many organisations and many believe this is going to be, at least partially, the new way of working.

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-09-29

The Effects Of The Internet On Society

The Internet has turned our existence upside down. It has revolutionised daily communications but has both positive and some negative effects.

2020-09-28

Confidential US Court Documents Published On The Dark Web

Across the USA, local governments & public sector entities have endured a wave of ransom attacks. None more so than in Louisiana.

2020-10-14

Social Media: An Exclusive 3 Part Review

With more than 3.5 billion users, social media is now a preferred medium for businesses to reach out to its target audience. Take A Closer Look.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-28

Directors Must Understand Their Organisation’s Cyber Risks

Business leaders must engage with and understand the risk profile for the commercial sector that their business is engaged with.

2020-09-29

How To Transmit Sensitive Information Over The Internet

Here are simple and efficient tips on how to protect the confidential data & information that you share online. By David Fisher

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Cybsecurity Foundation (CSF)

Cybsecurity Foundation (CSF)

Cybsecurity is a non-profit NGO, which aims to work on improvement of security levels in the Polish cyberspace.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

CyberESI

CyberESI

CyberESI is a Managed Security Service Provider providing 24x7 remote security monitoring and management of your mission-critical networks.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Infosec (T)

Infosec (T)

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Mindsight

Mindsight

Mindsight is a technology consulting firm with expertise from cybersecurity to cloud, disaster recovery to infrastructure, and collaboration to contact center.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

CoNetrix

CoNetrix

CoNetrix is a full service computer networking, software development, and security and compliance firm built on the principles of integrity, innovation, and initiative.