News

2017-10-30

Chinese & S. Korean Regulators Says ICO Investors At Risk

The up-and-coming method of raising funding via tokens based on the cryptocurrency Ethereum is unregulated with a huge potential for fraud.

2017-10-27

A New Approach To Combat Phishing

Major data breaches can start with a simple email. But providing employee training to combat phishing is a failing strategy.

2017-10-27

Facial Recognition Works on iPhone X. Sometimes.

The iPhone X might be the future of Apple’s smartphone design but its innovative Face ID struggles with under 13s, siblings or twins.

2017-10-27

Postmortem: WannaCry Ransomware Explained

WannaCry ransomware consists of multiple components infecting Windows operating systems. But the speed of its spread is something special.

2017-10-26

Innovation in Cloud-Based Video Analytics

Video analytics for the security industry is going through a rapid technological shift to smarter cloud-based, real-time and pro-active systems.

2017-10-26

Healthcare Suffers Most Cyber Security Incidents

McAfee say the healthcare industry is highly vulnerable and accounted for 26 percent of security incidents in the second quarter of 2017.

2017-10-26

US Asks China Not to Enforce Cybersecurity Law

The US has asked China not to implement its new cyber security law over concerns it could damage global trade in services.

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-25

Poor Coding Limits IS Hackers

Buggy Malware & Poor Encryption: Hackers working for Islamic State are bad at coding and and at hiding what they do.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

2017-10-24

Multicloud - The Next Step In Cloud Computing

Multicloud is an emerging pattern of use for cloud computing, when enterprises want to avoid dependence on a single public cloud provider.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Bishop Fox

Bishop Fox

Bishop Fox is a leading authority in offensive security, providing solutions ranging from continuous penetration testing and attack surface management to product and application security assessments.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

BullGuard

BullGuard

BullGuard is an award-winning cybersecurity company focused on providing the consumer and small business markets with the confidence to use the internet in absolute safety.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

South West Cyber Resilience Centre (SWCRC)

South West Cyber Resilience Centre (SWCRC)

The South West Cyber Resilience Centre (SWCRC) is led by serving police officers, as part of a not-for-profit partnership with business and academia.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Hexiosec

Hexiosec

Hexiosec (formerly Red Maple Technologies) is a technical consultancy and product company founded and run by engineers from the UK Intelligence and Defence communities.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Prowler

Prowler

Prowler is at the forefront of the Open Cloud Security movement, championing a new era of transparency, customizability, and community-driven security for cloud environments.