News

2016-02-03

The Dismal Sate Of Payment Data Security

A global study shows a critical need for organizations to fix their payment data security practices before new payments methods grow.

2016-02-03

Cyber and Reality Domains Converge As The US Targets ISIS Hackers

The threat posed by ISIS is bringing new meaning to convergence as the US military starts using air strikes against hacking groups.

2016-02-01

Egyptian Uprising - a 'social media revolution'?

The 'Arab Spring' pro-democracy uprisings and their outcomes varied wildly, yet they had one defining characteristic in common: social media.

2016-02-03

The Tech Revolution Will Change Or Even Erase Your Job

The 4th Industrial Revolution is under way and while it could lead to the loss of more than 7 million jobs, it's good news for some specialisations.

2016-02-03

10 Most Notorious Hacking Groups

Hacking has grown massively in the past few years and has become professional. Who are the 10 of the most notorious hacking groups so far?

2016-02-01

Israel’s Electrical Grid Cyber Attacked

The incident occurred during two consecutive days of record-breaking winter electricity consumption.

2016-02-01

Lloyd’s Insurer Says Cyber Risks Are Too Big to Cover

The head of the largest of Lloyd’s of London insurers says the potential liabilities from risks of cyber attack are too large to cover.

2016-02-01

Business Is Struggling To Combat Hacking

CISCO's 2016 Annual Security Report sheds light on the issues businesses are currently facing when it comes to cyber security.

2016-02-15

CIO Work Report - Executive Brief (£)

Studies of Chief Information Officer (CIO) employment shows that they tend to stay in a job on average for only 4 years and 4 months. Nevertheless, the likelihood of a long career often increases significantly for those CIOs that stay longer than 2 years and get engaged with their organisations.

2016-02-15

Corporations Drowning In The Data Flood (£)

All businesses have a major problem waiting for a solution but, is it something that most Boards never talk about. The storage of data, its costs and lack of use is a problem and an opportunity awaiting a solution.

2016-02-15

Proposed UK Law Requiring Business To Disclose Cyber Attacks (£)

Governments will over the next decade introduce legislation forcing businesses to firms to notify shareholders and police immediately after they have been hacked just as they would be expected to do for traditional security breaches.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Thales

Thales

Thales provides solutions, services and products that help its customers in the defence, aeronautics, space, transportation and digital identity and security markets to fulfil their critical missions.

SonicWall

SonicWall

SonicWall provide products for network security, access security, email security & encryption.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Sweepatic

Sweepatic

The Sweepatic reconnaissance platform discovers and analyses all internet facing assets and their exposure to risk.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Valarian

Valarian

Valarian (formerly Worldr) is on a mission to build cutting-edge solutions that empower borderless collaboration in the new era of digital sovereignty.

Onyxia Cyber

Onyxia Cyber

Onyxia's unique dynamic cybersecurity platform identifies gaps and prioritizes recommendations for proactive cybersecurity strategy, performance, remediation and management.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Miggo Security

Miggo Security

Miggo is the first Application Detection and Response (ADR) platform on a mission to stop application breaches.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.

Helix Tech Consulting

Helix Tech Consulting

Helix Tech have expertise in a wide range of technology areas, including IT strategy, infrastructure design, cybersecurity, disaster recovery, cloud, data centers, IT cost optimization, and more.