News

2018-09-28

Fancy Bear Have A Nasty New Weapon

Russia’s 'Fancy Bear' hackers have new malware that’s virtually impossible to eradicate, capable of surviving a complete hard drive wipe.

2018-09-28

Hackers Stealing High Grade Academic Research

Iranian hackers obtained access to secure university systems and research databases by phishing university staff & using spoof domains.

2018-09-27

Hackers Are Fighting A Surrogate Cold War

Hybrid warfare incorporates cyber tactics focusing on soft targets, disrupting businesses & parts of the economy previously thought safe from attack.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

2018-09-27

Dubai: Internet City

Dubai is fast becoming a smart city, with drones, robots and a special economic zone central to its plans to attract more investment.

2018-09-26

Canada Is Suspicions Of Huawei

Canada is working to minimise cyber threats from equipment made by foreign telecommunications companies, including China’s Huawei.

2018-09-26

AI Will Create 58 Million New Jobs By 2022

The growth of artificial intelligence could create 58 million net new jobs in the near term future, according to the World Economic Forum.

2018-10-01

Smartphones Are Working For Dutch Police

The Dutch National Police issued its officers and staff with 63,000 smartphones, creating numerous opportunities to do things differently.

2018-09-26

New Phishing Attack Uses An Old Trick

A new phishing campaign is using an old trick by claiming to offer a tax refund which can only be claimed online.

2018-09-25

Insurance Experts Expect Higher Cyber Losses

Insurers expect increased cyber-related losses across all business lines, driven by increasing reliance on technology and major cyber attacks.

2018-09-25

The Maritime Industry's Slow Boat To Cybersecurity

Despite its critical global role the maritime transportation sector has been slow to wake up to the need to protect its digital systems and assets.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

CERT-PA

CERT-PA

CERT-PA is the national Computer Emergency Response Team for Italian government institutions.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

RazorSecure

RazorSecure

RazorSecure offers products and services to enhance railway cyber security, by protecting and monitoring networks and key systems.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

Curtail

Curtail

Curtail keeps businesses running by using live traffic analysis to identify defects before software goes live, and detect and isolate security threats before they impact systems.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Opus

Opus

Opus dramatically reduces cloud security risks by enabling teams to define, orchestrate, automate and measure remediation processes across the entire distributed organization.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Softsource vBridge

Softsource vBridge

Softsource vBridge are an ICT systems integrator providing specialist technology solutions, professional services, technical expertise and data centre services.

enQase

enQase

enQase offers security beyond PQC; the only comprehensive, scalable solution that utilizes enhanced quantum technologies to protect data against current and future quantum threats.

DeepStrike

DeepStrike

DeepStrike is a leading cybersecurity firm specializing in human-powered, high-quality penetration testing designed to protect businesses from evolving cyber threats.