News

2016-11-21

Cultural Strategies For Data Security (£)

Information security is a complicated and often difficult subject for business leaders to understand. Here are some coping methods.

2016-11-21

Information Analysis Is The New Revolution (£)

Every industry has to deal with AI powered Information Analysis which is a significant aspect of the new technology revolution.

2016-11-21

Competitive Marketing Analysis (£)

A 4 Point Checklist for analysing your competitors.

2016-11-21

Was Donald Trump's Surprise Victory Hidden In The Data?

A dawning realisation that the Technology industry missed something fundamental about the fears & motivations of the people who use its products.

2016-11-24

The Internet of Things Must Not Be Allowed To Turn Into The Internet of Trouble

The lack of consumer awareness combined with a dearth of regulation over web connected devices is a recipe for IoT disaster.

2016-11-23

German Spy Chief Fears Russian Interference In 2017 Elections

Germany is alarmed that Russia may seek to interfere in its 2017 national elections, echoing US concerns prior to Donald Trump's victory.

2016-11-25

US Army Command Learning Cyberwar From Social Media

Young, social media-using soldiers may be the linchpin in the US Army's efforts to use cyberwar networks & virtual effects against enemies.

2016-11-24

Some Observations On Britain's New Cyber Security Strategy

A new strategy document spells out an assertive posture by a UK government that seems wary of sharing intelligence capabilities between allies.

2016-11-28

New Business Protection From Cyber Attackers

Entrepreneurs can be so focused on business building & day-to-day operations that they forget to protect their most precious data.

2016-11-23

BlackNurse DDoS Attacks Are Small But Mighty.

BlackNurse is a revolutionary cyber-attack technology. Hackers only need a laptop and minimal data to perform a crippling DDoS attack.

2016-12-03

Four Amazing Cybersecurity Facts

The global cybersecurity market is growing in every way. In Value, in Risks, in Costs and in the level of internal & external Threat.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

BankVault

BankVault

BankVault is a new type of cyber technology (called remote isolation) which sidesteps your local machine and any possible malware.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Cyble

Cyble

Cyble Vision enables faster detection of cyber threats and focuses on identifying and analysing the motivations, methods, capabilities and tools of adversaries.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Apex Systems

Apex Systems

Apex Systems is a world-class technology services business that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions.

CyberMindr

CyberMindr

CyberMindr is a SaaS platform for Automated & Continuous Attack Path and Threat Exposure Discovery helps you to proactively identify & assess your attack surface to mitigate associated threats.