News

2016-03-29

FBI Can Unlock iPhone Without Apple’s Help

US authorities have cancelled the court hearing with Apple, saying an ‘outside party’ has shown a potential way to crack Syed Farook’s iPhone.

2016-03-29

Clinton Emails Suggest Google's Assistance In Undermining Assad

An interactive tool created by Google was designed to encourage Syrian rebels and help bring down the Assad regime.

2016-03-31

Facial Recognition Might Stop the Next Brussels

Keeping terrorists away from crowded spaces requires recognizing them before they get there. No easy task.

2016-03-22

Cybercrime Is Changing

The anonymous and borderless nature of cybercrime puts every organisation at potential risk.

2016-03-22

ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks.

2016-03-25

Now Ambulances Are Vulnerable To Hackers

Cybersecurity in connected-vehicles is a big concern and few vehicles are more connected than ambulances.

2016-03-28

A Cashless Society Can’t Fix Our Money Worries

The advent of the cashless society is as certain as driverless cars or improved automated work tasks.

2016-03-23

NSA Using The Cloud To Thwart The Next Snowden

In a post-Snowden world, is it really a good idea to have analysts swimming around in one vast ocean of NSA secrets and data?

2016-03-25

Why Executives Need to Prioritise Cybersecurity

Despite the warnings of Sony, Anthem and many others, business executives still aren’t prioritising cybersecurity as a top business concern.

2016-03-28

Big Data: The 4 Layers Everyone Must Know

There are four different stages that data has to pass through from a raw unstructured datum to becoming an actionable insight.

2016-03-28

Cybersecurity Training, Military Style

Cybersecurity-training programs modeled on military tactics are making their way to the private sector.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

National Authority Against Electronic Attacks (NAAEA) - Greece

National Authority Against Electronic Attacks (NAAEA) - Greece

The National Authority Against Electronic Attacks (NAAEA) is the national computer emergency response team of Greece.

MSG Systems

MSG Systems

MSG are committed to intelligent IT and industry solutions and offer independent consulting on all aspects of information security.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Bitfury Group

Bitfury Group

Bitfury Group is the largest full-service blockchain technology company in the world.

Civic Technologies

Civic Technologies

Civic’s Secure Identity Platform (SIP) uses a verified identity for multi-factor authentication on web and mobile apps without the need for usernames or passwords.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Vertek

Vertek

Vertek is a leading provider of operations consulting, end-to-end business process outsourcing, business intelligence, software applications and managed cybersecurity solutions.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.