News

2020-06-08

Britain Turns To AI To Counter Espionage

Cyber security threats require a speed of response far greater than humans are able to do and the spies at GCHQ want to use AI to do the job.

2020-06-08

Hackers Targeting Both Trump & Biden Presidential Campaigns

Deja-Vu All Over Again: Foreign hackers have targeted the email accounts of staff working on both of the US 2020 Presidential campaigns.

2020-06-05

Stanford University Offers The Best US Cyber Security Degree

The cyber security degree offered by Stanford University has been ranked the best in the United States.

2020-06-05

US Ban On Semiconductor Exports To China Hits Huawei

The UK is expected to conclude that US export controls preventing semiconductor exports to China will stop Huawei supplying 5G equipment.

2020-06-05

Taiwan's Entire Population Database Stolen

It is very unusual for an entire nation’s database to be leaked but the secret details of 20m Taiwanese citizens have appeared on the Dark Web.

2020-06-05

What Can Hold Up Your International Project?

The term “export controls” is enough to send most people to sleep, but in the cybersecurity world it can have often unforeseen consequences.

2020-06-03

US Police Display Powerful New Surveillance Tools

Drones, Geo-Tracking & Facial Recognition: US police are deploying a range of weapons previously unseen in a US domestic setting.

2020-06-03

Half Of Lockdown Remote Workers Ignore Cyber Security

Workers are taking more risks working online at home than they would at the office and 52% of employees believe they can get away with it.

2020-06-03

Australia Creates Regional Cyber Innovation Centres

Australia is increasing its cyber security firepower by creating three new regional innovation nodes in Queensland to strengthen national capability.

2020-06-16

The Leading AI Cyber Security Firms (Part 1)

In a new era of digital business, companies are being driven to rethink their approach to technology. Part 1

2020-06-02

Customer Compensation Claim Follows The EasyJet Hack

EasyJet faces a liability of £18 billion from a class action claim filed in London on behalf of the airline's customers hit by a data breach.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Coveware

Coveware

Coveware helps businesses remediate ransomware. We help companies recover after files have been encrypted, and our analytic, monitoring and alerting tools help companies prevent ransomware incidents.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

Lupasafe

Lupasafe

Lupasafe is an all-in-one cybersecurity platform for MSPs and SMEs. See all your cyber risks: From training to phishing, darkweb scans, continuous tech monitoring, AI insights, reporting & compliance.

DeepStrike

DeepStrike

DeepStrike is a leading cybersecurity firm specializing in human-powered, high-quality penetration testing designed to protect businesses from evolving cyber threats.

Tonic Security

Tonic Security

Tonic is reshaping Exposure and Vulnerability Management by providing the context security teams need to accelerate prioritization and remediation of vulnerabilities and threats.