News

2019-08-06

More About The Capital One Breach

Details are emerging about the massive breach affecting over 100 million credit card customers of CapitalOne, which first went unnoticed.

2019-08-06

Surge Of Attacks On Banking & Finance Using N Korean Tools

The experts at F-Secure say the threat landscape for the financial sector might be getting even worse as criminals use nation-state hacker tools.

2019-08-06

Cyber Terrorism & Piracy

Terrorism today is a widening series of global alliances, supported and connected via social media and fake news. By Alfred Rolington

2019-08-06

Malware Attacks Drop As Encrypted Attacks Increase

Malware is down, but it's getting more malicious in terms of the type of malware and how it is delivered. Ransomware is now a SAAS offering.

2019-08-05

The Cyber Effect On Modern Warfare

The recent US retaliatory cyber-attack on Iran demonstrates that offensive cyber operations are now an integral arm of statecraft.

2019-08-05

We Can Reduce Cybercrime, But Why Are We Failing?

Devin Smith puts cybercrime under a magnifying glass, intending to combat or at least limit the malicious practices of criminal malpractitioners.

2019-08-01

Do Criminals Dream Of Electric Sheep?

EUROPOL thinks that cutting edge technologies, including AI, 5G, Quantum computing and the Internet of Things will all benefit cybercrime.

2019-08-01

Four Questions To Ask After An Attack

Swift and comprehensive incident response is a critical step to ensuring the future security of a business and protecting its reputation.

2019-07-24

Easy Cyber Knowledge Ch.2: Deep Web And The Dark Web

Alfred Rolington explores the hidden parts of the internet, concealed from regular search engines, where criminality in all its forms is flourishing.

2019-07-31

5G Networks Expand In The UK

The major mobile network operators in Britain, Vodafone, O2 and Three are in a hurry to deploy the new high bandwidth, low latency technology.

2019-07-31

The Financial Services Industry Just Does Not Get It

Anthem, Equifax, First American and now CapitalOne all placed millions of confidential customer data at risk. Have they learned nothing?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

mmCERT

mmCERT

mmCERT is the national Computer Emergency Response Team for Myanmar.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.