News

2018-12-07

Surveillance Spyware Targeted At Journalists In Mexico

Colleagues of a journalist who was shot dead in Mexico last year were the targets of surveillance spyware a day later.

2018-12-05

GCHQ Doesn't Always Tell Vendors If Their Software Is Vulnerable

GCHQ has a special team to search for flaws in different types of computer software and systems. They don't always disclose what they find.

2018-12-04

Russian Hackers Are Using Brexit To Leverage Cyber Attacks

The Fancy Bear hacking team is using Brexit in an effort to trick target institutions across the EU into opening emails and downloading malware.

2018-12-03

Marriott Hack- 500m Data Records Exposed

Hackers exfiltrated data on 500m customers, thought to include payment card details, name & address, along with the system encryption keys.

2018-12-05

AI Will Create Employment And Generate New Skills

AI and automation will open the door for scores of new job opportunities, many of which we can’t yet imagine.

2018-12-05

Britain's Top Soldier Warns Of Russian Threats

The head of the British army says Russia is now a "far greater threat" to the UK's national security than the Islamic State terror group.

2018-12-04

GDPR’s Impact: The First Six Months

GDPR is now six months old and already appears to be exerting a subtle but extremely influential impact across the Technology sector.

2018-12-03

Japan’s Cyber Security Minister Admits He Just Doesn't Get It

Forget The Typewriter: Japan's cybersecurity minister has admitted he's not that familiar with the whole field of cyberscurity.

2018-12-03

Learning From Hackers To Protect Against Attacks

Security professionals can look at how hackers operate and apply some of the tactics they use to help improve security.

2018-12-03

AI Will Monitor 3D Printing

Lockheed Martin and the US Office of Naval Research are exploring how to apply AI to oversee and optimize 3-D printing of complex parts.

2018-11-30

A Cyber Attack Could Spark A Run On Banks

Attacks can cause systemic problems unless Government works with banks to coordinate crisis communication to ensure consistent messages.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ISC2

ISC2

ISC2 is an international, non-profit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

4Stop

4Stop

4Stop is a global KYC, compliance and anti-fraud risk management company.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Fairfirst Insurance

Fairfirst Insurance

Fairfirst Cyber Insurance protects your business assets against the complexity of cyber threats.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Transmit Security

Transmit Security

The Transmit Security Platform provides a solution for managing identity across applications while maintaining security and usability.

Cyber Security Advisor

Cyber Security Advisor

Notice how sophisticated the cybersecurity market is. Think how would you pick the security provider, assess your company, and be sure of your security decisions? Cyber Security Advisor is the answer!

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.

NeoGuardian

NeoGuardian

NeoGuardian offer robust solutions to protect your data and systems against cyber threats, with an innovative and fully business-focused approach.