News

2018-03-15

Russia Has Lasers To Shoot Satellites

Russian defense companies have created a plane-mounted laser that can hit satellites, to achieve "destruction of those elements deployed in orbit.”

2018-03-07

Cybercime Against UK Business Is Up 63%

UK Office for National Statistics reports that incidents involving computer misuse and malware against business are significantly up.

2018-03-14

The Mysteries Of Crypotocurrencies

No aspect of the crypto-currency and blockchain space has been as poorly understood as the initial coin offering (ICO). Regulators want clarity.

2018-03-12

Cyber Criminals Catch Up With Nation-States

The trickle-down effect of advanced “military-grade” tools is seeing the gap between cyber-criminal & nation state attack capabilities closing.

2018-03-09

UK Think Tanks Hacked by Groups in China

Crowdstrike disclose a number of hacks on high profile UK think tanks by China-based groups dating from last year.

2018-03-07

Which Phishing Messages Have A Near 100% Click Rate?

Training employees to spot phishing emails, messages and phone calls needs to be frequent if the organisation wants to see click rates decrease.

2018-03-07

GDPR – Two Thirds of Organisations Aren’t Ready

Confusion: Two thirds of organisations aren't prepared for the General Data Protection Regulation (GDPR) 'right to be forgotten'.

2018-03-16

Cyberbullying Attacks the Young

Facebook, Snapchat & Twitter stand accused of failing to protect young people from harassment, with consequent mental health problems.

2018-03-08

The Most Severe Global Attacks Of 2017

Cisco: Cybersecurity breaches were twice as severe in 2017 than 2016 with financial losses totalling $500,000 (£356,00) per affected business.

2018-03-07

Preventing The Next Active Shooter Attack

Police need new security tools to detect concealed weapons and prevent the types of mass shootings that seem to be endemic to US culture.

2018-03-06

High Performance Face Recognition

Face recognition software using deep learning technology is claimed to offer a high level of precision, detecting part-covered and disguised faces.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Cyber London (CyLon)

Cyber London (CyLon)

CyLon is a leading cyber security accelerator and seed investment programme. We help entrepreneurs from across the globe to build cyber security businesses, raise investment, and develop partnerships.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Fraud.com

Fraud.com

Fraud.com ensures trust at every step of the customer's digital journey; this complete end-to-end protection delivers unified identity, authentication and fraud detection and prevention.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Startup Capital Ventures

Startup Capital Ventures

Startup Capital Ventures is an early stage venture capital firm with a focus on FinTech, Cloud/SaaS, Security, Healthcare IT, and IoT.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.