News

2019-10-01

N. Korean Hackers Attacking Cash Machines In India

DTrack: Hackers with ties to North Korea have developed a new malware variation to steal data from cards inserted into ATM machines in India.

2019-09-30

Iran Denies It Has Suffered Attacks On Its Oil Production

Iran has denied that its oil infrastructure had been successfully attacked by a cyber operation, following reports of disruptions to the sector.

2019-09-30

Top 5 Rules For Laying Out An Employee Cybersecurity Policy

Five tips to help you to develop an employee cybersecurity policy that helps your people to learn how to defend themselves. By Aimee Laurence.

2019-10-02

WEBINAR: How to perform a security investigation in AWS

Tuesday October 22 | Join SANS and AWS Marketplace for guidance on conducting efective investigations in your AWS environment.

2019-09-30

Rogue States Are Funding Stateless Hackers

Retired NSA Chief says cyber-attacks are more likely to come from criminals funded by US enemies than from the enemies themselves.

2019-09-30

Organised Social Media Manipulation

The use of computational propaganda to shape public attitudes via social media has become main-stream, far beyond the actions of a few bad actors.

2019-09-28

Huawei Will Sell Its 5G Know-How

Huawei wants to address the widespread concerns over the integrity of its 5G network technology by licensing it to EU and US competitors.

2019-09-26

Old Magecart Domains Come Back To Life

A consortium of malicious hacker groups who target online shopping cart systems known as Magecart are repurposing some old tools.

2019-09-25

Effective Cybersecurity Requires Both Cyber Training & Insurance Cover

A Belt & Braces Approach: Organisations can't rely an a firewall to keep out criminals. It takes proper training reinforced with good cyber insurance.

2019-09-25

Attack On Ukraine's Power Grid Targeted Transmission Stations

Crash Override: The experts at Dragos have recreated the 2016 attack timeline which knocked out the power supply to Ukraine's capital city.

2019-09-25

5G Needs A New Generation Of Security

5G networks can deliver much more data much faster, dramatically raising the stakes for ensuring the security & reliability of mobile communications.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Air Informatics

Air Informatics

Air Informatics LLC provides security, information management, analytics and informatics for IT and wirelessly enabled airplanes and operations.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

KirkpatrickPrice

KirkpatrickPrice

KirkpatrickPrice is dedicated to providing you with innovative security guidance and efficient audit services.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Netcraft

Netcraft

Netcraft is a global leader in cybercrime detection and disruption, combining cutting-edge technology with decades of experience to protect organizations of all sizes from digital threats and attacks.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

CyberTee

CyberTee

CyberTee is an Alliance designed for and by independent cybersecurity professionals to address the talent shortage.

SurePath AI

SurePath AI

SurePath AI is a SaaS platform that governs any GenAI solutions you build, adopt, or buy - even Shadow AI.