News

2016-05-02

Bangladesh Bank Hackers Compromised SWIFT

Attackers who stole $81 million from the Bangladesh central bank hacked into software from the SWIFT financial platform.

2016-04-26

US Give Philippines Eyes On The South China Sea

The United States will give its oldest Asia-Pacific security ally $42 million worth of sensors, radar and communications equipment.

2016-04-26

How To Deal With The Rising Tide Of Ransomware

Of all the money-making schemes hackers employ, the most prevalent is ransomware.

2016-04-26

Cybercrime Increases As Crooks Get AI Smarter

Symantec's 2016 Internet Security Threat Report reveals that 2015 saw an increase in hacking numbers and smarter attacks.

2016-04-27

On the Brink of Cyber War…

Moscow, Washington Meet Quietly in Geneva to renew efforts to prevent rushing into a cyber war “by mistake,”

2016-04-29

Self-Defence In A Connected World

As we embrace technology, we become increasingly vulnerable to cyber attacks. The threat is evolving in ways both startling & inventive.

2016-04-27

MoD Email Blunder Leaks Secret NATO Report

The British Ministry of Defence (MoD) made an 'administrative error' leading to the accidental leak of a secret NATO document.

2016-04-27

GCHQ Approved: Ten Cyber Degree Courses

Courses from the leading UK Universities provide elite training in cyber security endorsed & approved by GCHQ.

2016-04-29

Analytics To Discover Who's Really Who

Cyber-attacks show no signs of slowing down, and organizations continue to look at any & all approaches to improving security.

2016-04-26

EU General Data Protection Regulation Finally Passes

A two-year implementation process will begin the final step to completion before the regulation becomes EU law.

2016-04-27

The CIA Invests In Firms That Mine Social Media

Soft robots that can grasp delicate objects, computer algorithms designed to spot an “insider threat,” and artificial intelligence sifting large data sets.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Ackcent Cybersecurity

Ackcent Cybersecurity

Ackcent's mission is to help our clients to protect their critical digital assets by providing them with a portfolio of specialised professional services.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Seedcamp

Seedcamp

Seedcamp identify and invest early in world-class founders attacking large and global markets through disruptive technology in areas including AI, cybersecurity, and Fintech.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

NinjaOne

NinjaOne

The NinjaOne Platform was built to help IT and MSP teams efficiently manage, patch, and support all endpoints.