News

2017-07-05

FBI’s Cybercrime Report 2017

New data from the FBI shows that people over the age of 60 are most likely to become victims of cybercrime and suffer the heaviest losses.

2017-07-05

GDPR Guidance For May 2018

The EU GDPR enforces a much tougher and stricter regime, with much more severe penalties, than the UK Data Protection act it replaces

2017-07-05

FBI Investigating Kaspersky

FBI is gathering facts about how the Russia based cybersecurity company works and to "what extent the US operations ultimately report to Russia."

2017-07-05

Cybersecurity Is Too Important To Leave To IT

Management experts say that breaking down the corporate silos that keep IT and HR apart is a matter of urgency.

2017-07-05

Ukraine Police Trace Petya Attack Source

A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive Petya cyberattack.

2017-07-04

Cyberwar: A New Front For US Military

Cyber warfare is a game changer in how to assess enemies, meet their challenges and enact policies that match the growth of the cyber domain.

2017-07-03

Latest: All About Petya

The current Petya infestation spreads as rapidly and indiscriminately as WannaCry did, but it's better crafted and more dangerous.

2017-07-04

VR Systems Will Change US Navy Training

Virtual Reality and light detection technologies are about to change the way the US Navy prepares for war.

2017-07-03

Three Ways To Prepare Your Business For GDPR

The UK will apply the EU General Data Protection Regulation which comes into force next year on May 25th 2018. Get ready.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Ten Years Since The Outbreak Web War One

Estonia was the first victim of cyberwar and a decade later we are still grappling with the new era of increasingly sophisticated digital weapons.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

National Cyber Security Centre (NCSC) - Switzerland

National Cyber Security Centre (NCSC) - Switzerland

The National Cyber Security Centre is Swizerland's competence centre for cybersecurity and the first contact point for businesses, public administrations, and the public for cyber issues.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Saporo

Saporo

Saporo helps organizations increase their cyber-resistance. Continuously map your attack surface and get the recommendations you need to make your organization more resistant to attacks.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Mobilen Communications

Mobilen Communications

Mobilen are dedicated to providing our customers with the highest level of secure data in transit and to bring privacy back to a mobile world.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.

Visernic

Visernic

VISERNIC is a cyber security firm with a team of certified security experts dedicated to protecting organizations from evolving cyber threats.

IBN Technologies

IBN Technologies

IBN Technologies offerings include customized, high-end Cloud Managed Services and Cyber Security Solutions tailored to companies with critical Internet components.