News

2019-01-22

Blockchain Applications For Identity Verification

Blockchain's fundamental capacity to reconcile and keep a record of transactions has potential to carve out a niche in identity management.

2019-01-22

AI Will Find You In The Crowd

Neural network researchers say artificial intelligence can detect and identify individuals without facial recognition.

2019-01-22

Singapore Upgrades Cybersecurity

Singapore wants a new model of national cyber defence across 11 critical infrastructure sectors, including healthcare, energy, telecoms & transport.

2019-01-22

World Economic Forum Cyber Risks Report

WEF 2019 examines “what-if” Future Shocks in quantum computing, weather manipulation, monetary populism and emotionally responsive AI.

2019-01-21

Shutdown Is Doing Lasting Damage To US National Security

Halting cybersecurity work makes it easier for hostile nation-states to steal Americans’ personal information and corporate intellectual property.

2019-01-21

Zimbabwe Orders Internet Disconnected

The government in Zimbabwe has responded to widespread protests over rising fuel prices by cutting off the nation's wireless & internet services.

2019-01-18

Vietnam Says Facebook Is Acting Illegally

Vietnam has accused Facebook of violating a new cybersecurity law by refusing to remove anti-government content from its site.

2019-01-21

The Impact Of Tech Disruption On Jobs

If the robots can replace us, what are we left to do? Deloitte has looked at how the nature of work is shifting with automation.

2019-01-16

Quantum Computing Will Overtake Conventional Computing

Conventional computers are reaching their limit. Quantum computers, which calculate using quantum phenomena are the replacement.

2019-01-18

Global Cyber Attacks Up 63% Driven By AI

Significant growth in cyber attacks is driven by the increasing use of artificial intelligence by organised criminal groups.

2019-01-21

Google Search Results Spoofed To Create Fake News

A spoofing technique that creates fake Google search results could be used in political influence campaigns or for other subversive purposes.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.

CyberSentriq

CyberSentriq

CyberSentriq provides an unmatched combination of proactive AI-driven email and web security, advanced data protection, and operational resilience.

OmniSecuritas Technologies

OmniSecuritas Technologies

Omnisecuritas assists businesses in maintaining secure and resilient operations by providing comprehensive, affordable, turnkey cybersecurity products and services to businesses of all sizes.

iOT365

iOT365

iOT365 is the first-of-its-kind SAAS platform dedicated exclusively to Operational Technology (OT) security.