News

2020-08-24

Hackers Attack Israel’s Defence Sector

Suspected N.Korean hackers use LinkedIn to deliver fake job offers, aiming to infiltrate defense networks and steal sensitive security information.

2020-08-21

Creating Post-Modern Intelligence

The Internet is creating a global collaboration that is changing the way we view social connections and national borders. By Alfred Rolingon

2020-08-21

Remote Working Has Real Cyber Security Risks

Remote workers are highly vulnerable to cyber criminals during lockdown, but this could be just the push needed to transform cyber security.

2020-08-19

Identity Theft - A Very Personal Hacking Attack

Recently, a US Woman was hacked and her personal data held to ransom. She contacted us to tell her story and agreed that we tell it to you here.

2020-08-19

Cyber Crime Is Growing Very Fast Due To Coronavirus

An Interpol assessment of the impact of Covid-19 on cyber crime shows a significant change of focus to business and major corporations.

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

2020-08-18

Cyber Security Technology Sponsors Formula 1

Crowdstrike, Darktrace, Kaspersky & Thales are all piling in to F1 motor racing, promoting cutting-edge cyber security technology to global markets.

2020-08-18

Seven Cyber Security Questions Businesses Need To Ask Themselves

The British National Cyber Security Centre is offering technical advice on cyber insurance for businesses in the form of seven questions.

2020-08-18

Chinese Hackers Aim To Plunder Taiwan's Semiconductor Industry

Advanced semiconductor chips are vital for the IoT and 5G telecoms. Making them is Taiwan's strategic industry and China wants their secrets.

2020-08-18

Teacher Estimates Replace Algorithm That Reduced Exam Grades

It turned out to be a drastic mistake to allow high school students' critical examination results to be graded by Artificial Intelligence.

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

40Cloud

40Cloud

FortyCloud is a Cloud Security Broker providing an abstract security layer for cloud infrastructure deployments that is decoupled from the underlying cloud infrastructure.

Sookasa

Sookasa

Sookasa offers a single, seamless CASB solution to detect breach risks, encrypt data, and enforce your security policies.

Claroty

Claroty

Claroty was conceived to secure and optimize OT networks that run the world’s most critical infrastructures.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Connax

Connax

Connax's mission is to give simple and secure device integration with various IoT platforms, their applications and services.

Cybersecurity Collaboration Forum

Cybersecurity Collaboration Forum

The mission of the Cybersecurity Collaboration Forum is to foster information security communication and idea sharing across the C-Suite, enabling leaders to better protect their enterprises.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.