News

2019-02-14

Meeting The Cyber Talent Challenge Head-On

What can HR professionals do to lead the recruitment, retention and development of staff in cybersecurity roles?

2019-02-13

Military Cyber Training Methods

It's war between criminal hackers and corporate IT defense systems and when it comes to wars military organisations know how to fight them best.

2019-02-13

White Hat Female Hacker Leads The Way

The CEO of LMG Security is one of a small but powerful group of women rising to the top in the fast-growing cybersecurity industry.

2019-02-11

Dubai Police Hold 2nd Annual Cybersecurity Challenge

Dubai's “Capture the Flag” challenge intends to inspire enthusiasts to learn more about computer science and strengthen problem-solving skills.

2019-02-13

UK Student Loans Company In The Crosshairs

Cyber criminals are using malware, malicious emails and fake calls in attempts to access confidential financial data belonging to students.

2019-02-12

Foreign Hackers Target Canadian Government & Banks

The experts at FireEye say that Canadian banks, mining companies and government institutions are being targeted for IP theft and malware infection.

2019-02-12

Wicked Dark Web Wish List

The Dark Web is a lawless place, but even the most hidden corners of the darknet are not immune to the laws of supply and demand.

2019-02-12

The Top 5 Malware Attack Types

Nearly 20% of cyber-attacks reported to the UK Information Commissioner last year were malware-related and the total number is increasing.

2019-02-11

Five Arrested In UK Cybercrime Raids

London Metropolitan Police have arrested four men and a woman in connection with sophisticated malware attacks on numerous UK businesses.

2019-02-11

Please Login Or Sign Up

For continued FREE access to articles and Directory Listings Please Login to your Account or Sign Up.

2019-02-11

The Biggest International Cybercime Offenders

The cybercrime pandemic is highly lucrative with a low risk of prosecution. A few countries stand out as the most active attack sources.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

TCN

TCN

TCN is an advanced System Integrator and Infrastructure Company in Albania.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

CyberKnight Technologies

CyberKnight Technologies

CyberKnight Technologies is a cybersecurity focused value-added-distributor (VAD) headquartered in Dubai and covering the Middle East.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

TechBase

TechBase

TechBase is an innovation and start-up center offering technology-oriented start-ups optimal conditions for successful business development.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

BluSapphire

BluSapphire

BluSapphire is an industry-first, purpose-built, cloud-native, Hybrid XDR platform powered by AI and big data analytics.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Concertium

Concertium

Concertium is a complete cybersecurity partner equipped with the expertise and services to deliver end-to-end visibility and protection from evolving cyber threats.