News

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

2018-09-14

GCHQ Data Collection Violated Rights To Privacy

GCHQ’s methods of bulk interception of online communications violated privacy rules and failed to provide sufficient surveillance safeguards.

2018-09-17

Enterprise Blockchain Struggles To Carve Out A Niche

Blockchain enthusiasts refuse to believe it, but the long-term opportunity for its adoption falls short of the revolutionary disruption they hope for.

2018-09-17

Cyber Criminals Are Outspending Business

The cybercrime community spends over $1tn each year developing attacks, compared with the $96bn spent by organisations on security from attacks.

2018-09-17

Embracing The AI Robot Revolution

Relax. Robotics expert Prof. Noel Sharkey says robotics is about convenience and customers service, not an existential threat.

2018-09-14

The Rise of AI Driven DDoS Attacks

The new era of AI driven DDoS will have the power of IoT-based attacks, plus powerful feedback loops & automatic optimisations.

2018-09-13

Will Russian Hackers Affect this Year's US Election?

Once again, hackers on the outside of the American political system were probing for a way in to exert a malign influence on elections.

2018-09-13

Britain Plots Cyber Revenge On Russia For Novichok Poisonings

Britain and its allies promise revenge on Vladimir Putin’s regime for the Novichok attack believed to be carried out by Russian secret agents.

2018-09-13

The 'Deep Web' May Be x 500 Bigger Than The ‘Normal Web’

The deep web can be accessed only with specific software and it is estimated to be about 400 to 500 times larger than the common Internet.

2018-09-12

UK Victims Lose £28m To Cybercrime In 6 Months

Cybercrime is often committed by criminals who never come into contact with their victim, about half of all fraud & cybercrime comes from abroad.

2018-09-12

British Airways Faces £Multimillion Fine

BA faces a fine of up to £500 million from the Information Commissioner for the breach of GDPR rules caused by a massive hack of customer data.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

NASK SA

NASK SA

NASK SA is an integrator of telecommunications services. We provide advanced ICT security services, collocation and hosting, data centre services, and build corporate networks.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Loccus AI

Loccus AI

Loccus are developers of AI solutions in the voice safety space. We build identity verification solutions, deepfake detection systems and fraud protection products for companies and end-users.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.

Breeze Security

Breeze Security

The Breeze Platform acts as a defense coordinator, unifying security across identities, endpoints, cloud, and data to expose real attack paths, orchestrate remediation, and detect threats.