News

2016-01-28

How Much Are You Worth?

This new online tool can tell you what you should be earning from automated analysis of your CV.

2016-01-27

The New Art of War – Cyber Conflict

Cyberwar isn't going to be about hacking power stations. It's going to be far more subtle and much more dangerous.

2016-01-27

Safety Agreement On Cyber and Wired Vehicles

The US Govt. and 17 car makers have reached agreement to enhance vehicle safety to thwart cyber-attacks on their increasingly wired vehicles.

2016-01-27

Organisations Have A False Sense of Data Security (£)

Most organisations equate IT security compliance with actual strong defense, leaving their data at risk through a false sense of security.

2016-01-31

ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

2016-01-27

When ISIS Turns to Cyber Warfare

A US cybersecurity software firm PKWare has made predictions for potential computer attacks in the US and the forecast is scary.

2016-01-25

US Says China Stole Military Robot Designs

Chinese army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control military robots.

2016-01-25

World Economic Forum Says Cyber-attack Is A Top Risk To Business.

In 140 economies cyber-attacks rank in the top ten threats in 2016.

2016-01-22

2016 Is On The Cusp Of A Machine Revolution

The convergence of technologies across sensors, networks, artificial intelligence and robotics is making amazing things possible.

2016-01-20

UK Police Deploy Drone-Jamming Technology at Major Public Events

British police are planning to use sophisticated unmanned aerial vehicle (UAV) detection & jamming technology to detect terrorist threats.

2016-01-22

2016 Cyber Threat - Use To Advantage

Here are seven predictions for threat activity in 2016 from Security Week.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

Zanasi & Partners

Zanasi & Partners

Zanasi & Partners is a security research and advisory company active in the EU and MENA areas. Services focus on technology solutions.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Protocol Labs

Protocol Labs

Protocol Labs is a research, development, and deployment institution for improving Internet technology.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Tech Vedika

Tech Vedika

Tech Vedika has access to technical guidance, training and resources from AWS to successfully undertake solution architecture, application development, application migration, and managed services.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.