News

2019-03-08

NATO Defense Spending Should Privilege Cyber

The face of war is changing dramatically as cyber and electronic attacks become increasingly commonplace and NATO must adapt to this fact.

2019-03-08

Hackers Are Focused On Hijacking Payment Data

Symantec find thousands of websites are being hit by cyber-thieves who implant code to scoop up payment card numbers.

2019-03-08

No Easy Button Solution To Cybersecurity’s Skills Shortage

The consensus is that there is a talent shortage problem in information security. What’s not certain is the extent of the problem. By Evan Francen.

2019-03-01

UK And EU Will Connect With Cybersecurity After Brexit

Britain's National Cyber Security Chief says that his organisation wants to extend and deepen existing EU security relations after Brexit.

2019-03-07

Israel's Cyber-Hotline

Israel has launched a cyber hotline to enable businesses and private individuals to report suspected hacking and receive real-time solutions.

2019-03-07

Cyber Attribution Could Tear Apart NATO

NATO members presently lack the capability to jointly discuss attribution of cyber attacks needed to have the confidence to assist one another.

2019-02-25

Zuckerberg Has Failed

Facebook needs far-stricter regulation, with tough and urgent action necessary to end the spread of disinformation on its platform, say British MPs.

2019-03-07

What Is Data Fusion?

Big Data is all around us, in every field of life. But in spite of the far-reaching advantages, obvious clues frequently hide in a sea of unrelated data.

2019-03-06

Cyber Security Pros Are Feeling The Pressure

A major study carried out by Nominet reveals the heavy workload and budgetary problems that are having a physical effect on cybersecurity leaders.

2019-03-06

Blockchain’s Newest Application Is Civil Aviation

Blockchain networks and smart contracts can help mitigate some of the most difficult security issues in the aviation industry.

2019-03-06

Cyber Command’s Plan to ‘frustrate’ Hackers Is Working

Defend Forward: US cyber soldiers have found ways to let foreign nation-state hackers know they are being watched and can be intercepted.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Keynetic Technologies

Keynetic Technologies

Keynetic focuses on developing cybersecurity solutions for Industry 4.0.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity. The leading Risk Assessment Platform for Critical Infrastructure.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.