News

2016-10-28

Yes, US Voting Machines Are Vulnerable To Hacking

It's not a hypothetical security problem and Russian hackers have already successfully undermined democratic processes in Ukraine.

2016-10-28

Europol Warning: Crypto-Ransomware Threat

Crypto-ransomware is now the biggest malware threat facing law enforcers, according to the latest annual Europol Report on the threat landscape.

2016-10-27

How To Win The Cyberwar Against Russia

Russia’s election-year hacking of the US political system is an unprecedented situation for the American national security establishment.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-27

Christmas Is Cancelled: EU Running A Big Cyberwar Simulation

With growing tension over domestic terror attacks as well as on the borders with Ukraine & the Baltic states, ENISA is gaming a Christmas cyberwar.

2016-10-25

Using The Internet Competitor Analysis Effectively (£)

The web is full of massive amounts of data and analysis that can be used to clarify and offer focus to your market space.

2016-10-25

Cyber Knowledge Management (£)

Create the new role of Chief Cyber Knowledge Management Officer (2CKMO) and make it part of your Strategy.

2016-10-25

Cyber Security Myths for SMEs (£)

The average cost of a data hack-attack is now costing a small/medium business around $3/5 million every attack and it is increasing annually.

2016-10-25

Strategies For A Cyber Security Culture (£)

Creating a culture of Cyber sensitivity is now a corporate/business priority that should be well understood and engaged with at the Board level.

2016-10-25

Who Is Trying To Disrupt The Internet?

A prolonged Internet outage affecting major sites raises a real concern that this is just a practice run for more widespread internet disruption.

2016-11-10

China’s Plan To Organise Society Using Big Data

Imagine a world where an authoritarian government monitors everything you do and awards you a score that measures your trustworthiness.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Capy

Capy

Capy's SaaS-based security solutions will protect your website from bots, spam, humans and more.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

NAK Consulting Services

NAK Consulting Services

NAK is helping organisations to create Secure, Agile IT Environments. Our goal is to be the trusted advisor and managed service partner for our clients.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Zluri

Zluri

Zluri is a cloud-native SaaSOps platform enabling modern enterprises with SaaS Management and Identity Governance.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.