News

2017-04-03

Would Killing Bitcoin End Ransomware?

Cybecriminals often demand payment in crypto-currency. Would ransomware attacks decrease or stop if Bitcoin ceased to exist?

2017-04-03

No Easy Fix For SME Cybersecurity

Small and medium sized businesses are frequent targets for cyber attacks and their results can be devastating.

2017-04-01

Wikileaks Vault 7 And The CIA Hacking Arsenal

The un-cover-up, the fact of the leak itself, is probably more significant than the substance of what has thus far been revealed.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-04-03

Cyber Insurance: 7 Questions To Ask

Insurance for cybersecurity is different from other types of insurance because the nature of threats is constantly changing.

2017-03-31

WikiLeaks Will Share CIA's Hacking Secrets

Tech companies are not lining up to accept Wikileaks offer to get access to the stolen CIA hacking tools to help fix software vulnerabilities.

2017-03-30

Here Comes China’s Crypto-Currency

Forget about Bitcoin. China is busy converting the Renimbi to digital and this crypto-currency has the backing of an entire nation.

2017-03-30

Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure on April 7th.

2017-03-30

Hong Kong’s 3.7 Million Voters Exposed in Massive Breach

Hong Kong has suffered its biggest ever data breach after the personal details 3.7 million voters were lost on stolen laptops.

2017-03-29

WikiLeaks Dump Shines Light On US Intelligence’s Zero-Day Policy

Zero Days exploits used to create and promulgate a software patch are goldmines for US intelligence agencies.

2017-03-29

Board-level Cyber Literacy Is Low, Discomfort High

Business leaders who continue to view cybersecurity as a matter for the IT department leave their companies exposed to major risks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DataGuidance

DataGuidance

DataGuidance is a platform used by privacy professionals to monitor regulatory developments, mitigate risk and achieve global compliance.

Wooxo

Wooxo

Wooxo provides business security and continuity solutions to protect business data for organisation of all sizes.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

SpeQtral

SpeQtral

SpeQtral offers commercial space-based Quantum Key Distribution (QKD) founded on technology developed at the National University of Singapore.

TheHive Project

TheHive Project

TheHive Project is a Scalable, Open Source and Free Security Incident Response Platform for SOC, CSIRT and CERT teams.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

ClearFocus Technologies

ClearFocus Technologies

ClearFocus Technologies provides advanced cybersecurity services that secure our nation’s most sensitive assets.