News

2018-09-10

British Airways Data Breach

Under the newly enforced GDPR rules BA could face potentially significant fines from the UK ICO for a data breach affecting 380,000 transactions.

2018-09-10

Big Companies Have An Achilles Heel

The proliferation of network access points experienced by large organisations is multiplying both their risks and their potential liabilities.

2018-09-07

British Airways Fake Facebook Page

The bogus “British Airways Holidays”page steals personal data by claiming you can win holidays and free air travel by clicking a “Sign Up” button.

2018-09-10

Widepsread Campaign Hacking Instagram Accounts

The hack sees account names, profile pictures, passwords and email addresses changed with new data originating from a Russian provider.

2018-09-06

Germany Promotes Cybersecurity Research

The German government wants to end reliance on digital technologies from the United States, China and others by building its own capabilities.

2018-09-06

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-05

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-06

Hackers Breach Cryptocurrency Platform

Cryptocurrency platforms are increasingly targeted by cybercriminals and Atlas Quantum is the latest to be breached with 240,000 users compromised.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

2018-09-03

What Europe Can Do To Catch Dark Web Criminals

Europe gets serious about fighting crime schemes hatched on the dark web, the home of hackers, pedophiles, terrorists, and other undesirables.

2018-09-05

The Best Security Is Based On Zero Trust

When illegitimate users get access to the data centre the architecture implicitly trusts them - there is little to impede intruders once inside.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

Southwest Research Institute (SwRI)

Southwest Research Institute (SwRI)

Southwest Research Institute SwRI are R&D problem solvers providing independent services to government and industry clients. Areas of expertise include Cybersecurity, Intelligent Networks and IoT.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.