News

2020-01-07

Cyber Criminals Demand Ransom From Travelex

Hackers are holding foreign exchange company Travelex to ransom after a cyber-attack forced the firm to turn off all computer systems for 4 days.

2020-01-07

Cyber Spying For A Future War

Exposed: New information and communications technologies are beginning to profoundly affect how current and future wars will be waged.

2020-01-07

N.Korean Hackers Are Working With European Criminals

There is growing evidence that cyber criminals in Eastern Europe and skilled state-backed spies in North Korea are finding ways to work together.

2020-01-07

Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI say that Smart TV and other IoT devices can used by criminals to hack into home computer networks to rob you and spy on your family.

2020-01-07

Iran's Cyberwar Response To Its General's Killing

Military and cybersecurity analysts are warning that Iran's response could include, among other possibilities, a wave of disruptive cyberattacks.

2020-01-07

Top 20 Cyber Security Companies At The Start Of 2020

Here are 20 of the best cybersecurity companies: With different approaches, from mavericks to major brands, some known for other types of solutions.

2020-01-06

Few Businesses Are Ready For California’s New Consumer Data Privacy Law

The California Consumer Privacy Act has been effective since January 1st 2020 although it doesn’t look like everyone there is quite ready.

2020-01-06

The Invisible Areas Of The World Wide Web

After more than 20 years of online access the Internet is still in the early evolutionary stages. Some parts of it are visible and others are not.

2020-01-03

Cyber Attacks On Africa Are Soaring

Africa is widely considered the lowest ranked continent for cyber security, with the consequence of attracting a growing range of cyber threats.

2020-01-03

Criminals Are Using AI For Attacks

AI is rapidly finding applications in nearly every walk of life and cyber criminals are focusing on manipulating AI systems for malicious purposes.

2020-01-03

Wanted: International Cyber Standards

US military chiefs and EU political leaders can agree on one thing. That a lack of international standards for cyberspace is a big problem.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

BehavioSec

BehavioSec

BehavioSec uses the way your customers type, swipe, and hold their devices, and enables them to authenticate themselves through their own behavior patterns.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Keepnet Labs

Keepnet Labs

Keepnet Labs is a phishing defence platform that provides a holistic approach to people, processes and technology to reduce breaches and data loss and presents anti-phishing solutions.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

DigitalXForce

DigitalXForce

DigitalXForce is the Digital Trust Platform for the New Era – SaaS based solution that provides Automated, Continuous, Real Time Security & Privacy Risk Management.

Dispel

Dispel

Dispel makes the fastest secure remote access for industrial networks. Built by operators for operators: a zero trust engine for your entire OT, IoT, and xIoT stack.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.