News

2018-09-06

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-05

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-06

Hackers Breach Cryptocurrency Platform

Cryptocurrency platforms are increasingly targeted by cybercriminals and Atlas Quantum is the latest to be breached with 240,000 users compromised.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

2018-09-03

What Europe Can Do To Catch Dark Web Criminals

Europe gets serious about fighting crime schemes hatched on the dark web, the home of hackers, pedophiles, terrorists, and other undesirables.

2018-09-05

The Best Security Is Based On Zero Trust

When illegitimate users get access to the data centre the architecture implicitly trusts them - there is little to impede intruders once inside.

2018-09-04

Training Young Hackers To Stop Cybercrime

British police chiefs and intelligence officers hope that young people will become their latest recruits in the rapidly evolving cyber war.

2018-09-07

Why Mainframe Security Risks Are Largely Unrecognized

Healthcare records are a top target for hackers, but what about vulnerabilities that aren’t even on the radar of hospital IT departments?

2018-09-07

Organizations Hit With North Korea-Linked Ryuk Ransomware

A recent wave of ransomware attacks against organizations have been linked to a notorious North Korean threat actor.

2018-09-07

Blockchain, Chatbots, AI Could Reinvent Corporate Finance

Traditionally siloed corporate finance operations are beginning to test technologies that can offer a single view of corporate data.

2018-09-07

Hamas Turns To Instagram To Lure IDF Soldiers

New effort uncovered by Hamas to trick soldiers into downloading spyware onto their phones by befriending them on Instagram.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

Swiss Re

Swiss Re

Swiss Re Group is a leading wholesale provider of reinsurance, insurance and other insurance-based forms of risk transfer including cyber risk.

Smokescreen

Smokescreen

Smokescreen's IllusionBLACK employs deception technology to detect, deflect and defeat advanced hacker attacks.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Qubika

Qubika

Qubika are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence.