News

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-14

Cybersecurity Needs A Collective Approach

The boom in cybercrime means it is no longer a problem reserved for the IT department - everyone must work together to tackle the threat.

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

2018-09-14

GCHQ Data Collection Violated Rights To Privacy

GCHQ’s methods of bulk interception of online communications violated privacy rules and failed to provide sufficient surveillance safeguards.

2018-09-17

Enterprise Blockchain Struggles To Carve Out A Niche

Blockchain enthusiasts refuse to believe it, but the long-term opportunity for its adoption falls short of the revolutionary disruption they hope for.

2018-09-17

Cyber Criminals Are Outspending Business

The cybercrime community spends over $1tn each year developing attacks, compared with the $96bn spent by organisations on security from attacks.

2018-09-17

Embracing The AI Robot Revolution

Relax. Robotics expert Prof. Noel Sharkey says robotics is about convenience and customers service, not an existential threat.

2018-09-14

The Rise of AI Driven DDoS Attacks

The new era of AI driven DDoS will have the power of IoT-based attacks, plus powerful feedback loops & automatic optimisations.

2018-09-13

Will Russian Hackers Affect this Year's US Election?

Once again, hackers on the outside of the American political system were probing for a way in to exert a malign influence on elections.

2018-09-13

Britain Plots Cyber Revenge On Russia For Novichok Poisonings

Britain and its allies promise revenge on Vladimir Putin’s regime for the Novichok attack believed to be carried out by Russian secret agents.

2018-09-13

The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The deep web can be accessed only with specific software and it is estimated to be about 400 to 500 times larger than the common Internet.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

IoT Now

IoT Now

IoT Now explores the evolving opportunities and challenges facing CSPs, and we pass on some lessons learned from those who have taken the first steps in next gen IoT services.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Eskive

Eskive

Eskive is a Brazilian cyber security awareness and education platform that empowers users and strengthens their company in the face of cyber threats.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Creative ITC

Creative ITC

Creative ITC is a leading infrastructure and cloud enablement company. We design and deliver exceptional managed services and cloud solutions.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.

TraitWare

TraitWare

The TraitWare mission is to increase user and company security while simplifying access to digital and physical resources through the elimination of the need for usernames and passwords.