News

2018-07-03

Inside The Chinese-Hacking Underground

The experts at Flashpoint know how to identify & characterise the exploits of Chinese hacking groups distinct from those of other nations.

2018-07-03

Trump Backs Russia On Election Interference

President Trump contradicts the US intelligence establishment's conclusions about Russian interference in the 2016 Presidential elections.

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

2018-07-02

Israel Gets 20% Of Global Cybersecurity Investment

Prime Minister Netanyahu claims that surging investment in the emergent Israeli cybersecurity industry has tangible benefits for national defence.

2018-07-02

By 2020 US Immigration Will Be Digitised

Can an alliance of US Army lawyers, language processing technology and facial recognition fix the US immigration crisis? It seems unlikely.

2018-07-10

So Much Hot Air About Virtual Currencies

Rhetoric on virtual currencies has centred on risks and threats. But the technology also has the potential to promote financial inclusion.

2018-07-02

Get Started with Predictive Analytics

Many businesses don't fully understand the holistic view predictive analytics can bring to their organisation. They need to try harder.

2018-07-02

What War Games Tell Us About The Use Of Cyber Weapons

The US defence establishment have been gaming cyber warfare to find out if cyber weapons are equally as destructive as conventional weapons.

2018-06-29

Cyber Attackers Tunnel Into Financial Services Firms

Global financial services organisations are targeted by sophisticated cyber attackers to steal critical data and personally-identifiable information.

2018-06-29

Cybersecurity Issues For Open Banking

Only a standardised, industry-wide format will give the security and assure the level of trust crucial to the success of the Open Banking initiative.

2018-06-28

Effective Data Security Is A Team Effort

Delivering effective data security in today’s business environment can be challenging. To achieve it takes teamwork and communication.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

DataDog

DataDog

DataDog provides Cloud-native Security Monitoring. Real-time threat detection across your applications, network, and infrastructure.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

TisOva

TisOva

TisOva is an innovative cybersecurity startup dedicated to addressing the growing issue of online scams targeting students.

ArmourZero

ArmourZero

ArmourZero help organisations redefine their cybersecurity strategy - increase visibility, minimise complexity, manage risk, and enhance protection, all under a unified security operations platform.

Breez Security

Breez Security

Breez Security's mission is to address the increasingly complex and ever evolving challenges of identity security.