News

2018-08-02

Five Key Ways to Protect Your Company Against Cyber Attacks

The steps to achieving business security include the use of up-to-date data encryption, data back-up, firewalls, anti-malware software and insurance.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-08-02

MoneyTaker Take Money From A Russian Bank

The MoneyTaker group are hard to track because they use common OS utilities to perform malicious actions, instead of relying on actual malware.

2018-07-25

Trump / Putin Summit Was A Magnet For Hackers

The Helsinki meeting between Presidents Trump and Putin was as big a magnet for hackers as the Singapore summit with Kim Jong-un.

2018-08-02

What A ‘Cyber 9/11’ Would Look Like

Experts think national cyber vulnerabilities stem in large part from a lack of qualified people capable of defending companies and governments.

2018-07-24

Fraudsters £350k Spoof University Emails

Action Fraud issue a warning as reports show that fraudsters are registering domain names to look like they belong to UK university email addresses.

2018-07-24

Mitigating IoT Cyber Risks: Training Is The First Step

It is vital to educate everyone in the risks involved with adopting increased IoT connectivity and how it can be mitigated.

2018-07-23

Darktrace - From Cybersecurity Start-Up To Unicorn

Darktrace has been named Europe's most promising tech company with a $1.25 billion valuation and contracts secured worth $400m.

2018-07-23

No More Asylum For Julian Assange

Ecuador is planning to withdraw its political asylum for Assange, eject him from its London embassy & might turn him over to the British authorities.

2018-07-21

Trump Blames Obama For Russian Cyber-Attack

US President Donald Trump has blamed Barack Obama for failing to prevent Russia’s 2016 cyber-attack on democratic email servers.

2018-07-23

NZ Cyber Security Challenge Simulates Drone Attacks

Around 400 aspiring cybercrime fighters in New Zealand will attempt to infiltrate a horde of killer drones, manufactured by a criminal group.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Skybox Security

Skybox Security

Skybox combines firewall and network device data with vulnerability and threat intelligence, putting security decisions in your unique network context.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Alarum Technologies

Alarum Technologies

Alarum Technologies (formerly Safe-T) is a global provider of cyber security and privacy solutions to consumers and enterprises.

Communications Security Establishment (CSE) - Canada

Communications Security Establishment (CSE) - Canada

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Introspective Networks

Introspective Networks

Introspective Networks (IN) is a Cybersecurity company focusing on securing data in the network and automating knowledge work to decrease vulnerability points to critical infrastructure.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

CNS Group

CNS Group

CNS Group provides industry leading cyber security though managed security services, penetration testing, consulting and compliance.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.