News

2018-07-23

UK Launches Consultation To Develop Cybersecurity Profession

The UK Government has launched a consultation into developing the cybersecurity profession to support the National Cyber Security Strategy.

2018-07-20

Cyber Threat Warnings ‘Blinking Red’

US intelligence chief fears urgent cyber threats coming from Russia, China, Iran & N Korea as well as criminal networks and individual hackers.

2018-07-17

Cybersecurity Awareness & Compliance Training – That’s Bob’s Business

A company specialising in cybersecurity awareness that helps organisations become GDPR compliant has won a Royal Competition.

2018-07-20

Android Abuse: EU Fines Google $5.1 Billion

The EU is taking aggressive regulatory action against the US technology giant that may cause lasting changes to the smartphone industry.

2018-07-24

Quantum Computing Is Becoming Reality

The first thing to know about quantum computing is that it won’t displace traditional, or ‘classical’ computing…Yet…

2018-08-08

Crypto-Mining Hits 42% Of Organisations Worlwide

Criminals are using cloud infrastructure to target organisations with crypto-mining malware to develop illegal revenue streams.

2018-08-08

EU Cybersecurity Act Could Impact Cross-Border Data Flows

The proposed EU Cybersecurity Act would create a single certification scheme for ICT and place IoT device manufacturers under major pressure.

2018-08-07

Hackers Paid Big Money To Improve Cybersecurity

Hackers are being paid big bounties by business and government agencies to discover bugs and to protect platforms, products and consumers.

2018-08-07

Business Will Benefit From Artificial Intelligence

AI will rapidly gain traction in these three critical areas of business: Decision Support, Equipment Maintenance and Customer Contact.

2018-08-01

Israel Wants Collaborators For Defence

Israel is looking to collaborate with other countries including India to develop state-level cyber shields via the Israel National Cyber Directorate.

2018-08-03

Robots Will Invade The Workplace

"The spread of computers ... will put jobs in two categories. People who tell computers what to do, and people who are told by computers what to do."

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

SecDev

SecDev

SecDev is a consulting firm working at the intersection of geopolitical, digital, urban, energy and cyber risk.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Institute for Security and Technology (IST)

Institute for Security and Technology (IST)

The Institute for Security and Technology's goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).