News

2019-08-07

British Army Reshapes Itself To Fight Cyberwars

Computer hackers and propaganda specialists are to form 6th Division, reflecting a doctrine that the boundaries between peace and war are fading.

2019-08-06

More About The Capital One Breach

Details are emerging about the massive breach affecting over 100 million credit card customers of CapitalOne, which first went unnoticed.

2019-08-06

Surge Of Attacks On Banking & Finance Using N Korean Tools

The experts at F-Secure say the threat landscape for the financial sector might be getting even worse as criminals use nation-state hacker tools.

2019-08-06

Cyber Terrorism & Piracy

Terrorism today is a widening series of global alliances, supported and connected via social media and fake news. By Alfred Rolington

2019-08-06

Malware Attacks Drop As Encrypted Attacks Increase

Malware is down, but it's getting more malicious in terms of the type of malware and how it is delivered. Ransomware is now a SAAS offering.

2019-08-05

The Cyber Effect On Modern Warfare

The recent US retaliatory cyber-attack on Iran demonstrates that offensive cyber operations are now an integral arm of statecraft.

2019-08-05

We Can Reduce Cybercrime, But Why Are We Failing?

Devin Smith puts cybercrime under a magnifying glass, intending to combat or at least limit the malicious practices of criminal malpractitioners.

2019-08-01

Do Criminals Dream Of Electric Sheep?

EUROPOL thinks that cutting edge technologies, including AI, 5G, Quantum computing and the Internet of Things will all benefit cybercrime.

2019-08-01

Four Questions To Ask After An Attack

Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation.

2019-07-24

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web

Alfred Rolington explores the hidden parts of the internet, concealed from regular search engines, where criminality in all its forms is flourishing.

2019-07-31

5G Networks Expand In The UK

The major mobile network operators in Britain, Vodafone, O2 and Three are in a hurry to deploy the new high bandwidth, low latency technology.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

ComTrue Technologies

ComTrue Technologies

ComTrue Technologies provides artificial intelligence solutions and information security solutions.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

IT Security Jobs

IT Security Jobs

IT Security Jobs is a dedicated portal for everything related to IT professionals looking for IT Security jobs.

Concentric AI

Concentric AI

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Liberty Mutual

Liberty Mutual

Liberty Specialty Markets offers specialty and commercial insurance and reinsurance products, including Cyber, across the USA, Europe, Middle East and other international locations.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

InQuest

InQuest

InQuest specialize in providing comprehensive network-based security solutions that empower organizations to protect their most critical assets: their people.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.