News

2019-07-30

What Is The Dark Web?

A collection of websites that exist on an encrypted network and cannot be found by using traditional search engines or by using traditional browsers.

2019-07-30

Cyber Security Threats Are Growing In 2019

Cybercrime has hit business with increasing costs, so it is important to review your organisation's security measures against attacks in Q3 2019.

2019-07-30

GDPR Requires Better Methods Of Authentication

GDPR has brought a much tighter data protection regime and compliance should move organisations towards having much stronger user authentication.

2019-07-28

Expert Hacker Spared Jail

British hacker Marcus Hutchins is very lucky to have dodged a long jail sentence after a US judge recognised his good work in stopping Wannacry.

2019-07-29

Malware Delivery Via LinkedIn

A Phishing campaign using LinkedIn network invitations to deliver malicious documents included the use of three new malware families.

2019-07-29

One Costly Minute Of Cybercrime

Cybercriminals cost the global economy $2.9 million every minute last year, a total of $1.5 trillion according to RiskIQ's 'Evil Internet Minute'.

2019-07-29

Russia Hacked All US State Election Systems

Two years after the Presidential election, it turns out Russian hackers focused on voter registration systems and databases, not voting machines.

2019-07-29

Lancaster University Hit By Data Thieves

Lancaster University has suffered a sophisticated and malicious phishing attack which has resulted in breaches of student and applicant data.

2019-07-26

Cyberwar: Covert Cyber Attack Campaign Is Underway

A M.East cyberwar is running at full speed. Networks are being probed, weaknesses and vulnerabilities tested, offensive actions planned.

2019-07-26

Business Is Starting To Believe That AI Is The Best Defence

Two thirds of organisations acknowledge that they will not be able to respond to the next generation wave of critical threats without AI.

2019-07-25

Cannabis Buyers Are Uniquely Vulnerable To Cyber Attacks

N. America’s emerging cannabis industry, along with many of its customers, could be especially vulnerable to hackers and extortion.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Langner

Langner

Langner is a software and consulting firm specialized in cyber security for critical infrastructure and large-scale manufacturing.

Secure-IC

Secure-IC

Secure-IC provide end-to-end, best-of-breed security expertise, solutions, and hardware & software technologies, for embedded systems and connected objects.

Responsible Cyber

Responsible Cyber

Protect yourself with Responsible Cyber’s 360° platform, IMMUNE, arming you with comprehensive support for your business.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

ID R&D

ID R&D

ID R&D is an award-winning provider of AI-based facial liveness, document liveness, and voice biometrics.

RIoT Secure

RIoT Secure

RIoT Secure AB is a technology enabler within the IoT industry - created with a vision to ensure security technology exists in the foundations of software development for IoT solutions.

XBOW

XBOW

XBOW brings AI to offensive security, augmenting the work of bug hunters and security researchers.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.