News

2015-08-14

The Robots Taking Your Job Could Get You Killed

Poorly implemented automation in chemical & pharmaceutical plants is highly vulnerable to a catastrophic cyber attack.

2015-08-14

Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

A computer virus was used to spy on the recent high-level Iran nuclear talks. Who would do that?

2015-08-14

Hackers Target Internet Address Bug to Disrupt Sites

A recently identified bug allows attackers to crash software, taking the DNS service offline & preventing URLs from working.

2015-08-14

Predictive Policing Technology Arrests

An intelligence led computer programme that uses an algorithm to pin-point officers to zones where crime is most likely to occur.

2015-08-14

U.S Elections and the Coming Cyber Wars

The row over Hilary Clinton's private email server and redacted communications rumbles on.

2015-08-14

Malaysia: Umno members told to go on ‘cyber war’

Social Media leads the contest as politics in Malaysia turn nasty.

2015-08-19

Russia, China & U.S. Engage in Cyber War

The cyber warfare between the U.S.A, Russia and China is part of an overall epoch-defining conflict between the three nations.

2015-08-14

The NSA Playset: 5 Better Tools To Defend Systems

Cutting edge security tools made accessible & easier to use, tapping into the open source software community.

2015-08-14

Twitter says U.S Government Want More User Account Information

Twitter reveals that requests for account information from governments has jumped 52%, mostly to do with criminal investigations.

2015-08-14

France & UK on the Edge of Kafkaesque Surveillance

Are the surveillance tools that France and Britain are using too blunt and intrusive for modern democracies?

2015-08-14

HTC: Rendered Worthless By Insecurity?

Competition from above and below, combined with a shocking security lapse, knock HTC for six.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

National Cybersecurity Agency (ANCS) - Tunisia

National Cybersecurity Agency (ANCS) - Tunisia

ANCS (L'Agence Nationale de la Cybersécurité) is the national cybersecurity agency for Tunisia.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

ETAS

ETAS

ETAS (formerly Escrypt) is a pioneer and one of today’s leading solution providers for embedded IT security.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

CyberAntix

CyberAntix

CyberAntix offers Premium CyberSecurity for your business using an advanced Security Operations Centre technology and process platform reinforced by a steadfast and expert SOC team.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.

Maximus

Maximus

Maximus is a trusted service delivery partner and architect of government technology solutions, we empower communities by ensuring seamless and equitable access to government services.