News

2019-05-14

Fake News Ahead Of EU Elections

The EU is experiencing a surge in information warfare in an attempt to sway the outcome of elections later this month.

2019-05-17

What's Your Data Strategy?

All businesses need a Data Strategy which encompasses audits, reviews their security, data protection & employee cyber awareness training.

2019-05-22

Hackers Don't Only Target Big Business

Specialist Insurers Hiscox find that hackers are shifting focus from larger companies and that SMEs are now equally vulnerable.

2019-05-22

Verizon 2019 Data Breach Report

No matter what defensive security measures are put in place, attackers can get through. Verizon's latest Data Breach Report confirms the problem.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-16

AI In Cyber Security Is Worth Almost $5B

The surge of cyber attacks is one of the prime growth factors behind the AI-driven cyber security market, currently valued at $4.94B.

2019-05-21

Young Hacker Makes $1m. Legally.

It Pays To Be Ethical: A 19-year-old Argentinian has made history as the first to earn over $1,000,000 in bug bounty awards.

2019-05-21

Israel Hits Back At Hamas Cyber Attackers

As more details emerge, it is thought to be the first instance of retaliation with physical military action in real time against a cyber-attack.

2019-05-17

Israel Finds It Has Numerous Cyber Vulnerabilities

Israels's National Cyber Directorate thinks that the national cyber agencies & infrastructure companies need  a clear legal framework.

2019-05-20

Social Media Is The New Gutenberg

As the Gutenberg Revolution upset many aspects of government and religion, so Social Media is now changing our concepts about real and fake news.

2019-05-14

Digital Techniques Drive Safety And Speed

Remote access technologies & robotics are eliminating human risk in hazardous heavy manufacturing and in designing training methods.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Tessian

Tessian

Tessian (formerly CheckRecipient) is a next-generation email security platform that helps enterprises counteract human error and significantly reduce the risk of data loss.

CyberArrow

CyberArrow

CyberArrow (formerly EBDAA) is a consultancy company providing high quality consultancy services in Risk & Compliance and Awareness & Education.

Boldon James

Boldon James

Boldon James are market leaders in data classification and secure messaging software.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.

Synergy ECP

Synergy ECP

Synergy ECP has a talented, dedicated staff to provide a broad range of services to the defense and intelligence industries.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.