News

2015-05-12

Impact of New EU Data Legislation Not Widely Understood

A third of public & private sector professionals are unaware of forthcoming EU General Data Protection Regulation.

2015-05-12

Germany’s BND Intelligence Agency Has Been Spying for the NSA.

An outraged Bundestag NSA Investigation Committee has demanded lists of search terms the BND used to spy for Washington.

2015-05-12

The US Air Force Wants You to Build a Drone Engine

“A successful 100-horsepower turbo shaft engine that operates on Jet A fuel and generate at least 2.0 horsepower per pound.”

2015-05-16

Data Protection Drives Cloud Security Market

The cloud security services market grew 14% in 2014 to $7.2 billion worldwide.

2015-05-12

UK Police Ill-Equipped to Deal with Cybercrime

Police are playing catch-up with cybercrime, and are struggling with poor reporting, a lack of data and the InfoSec skills shortage.

2015-05-16

IBM Breakthrough In Quantum Computing

IBM scientists have announced the two primary advances towards the quantum computer’s practical realization.

2015-05-12

US Republican Senators Come Out In Force To Keep NSA’s Domestic Surveillance Alive

Does the NSA’s expansive surveillance powers need to remain intact to keep Americans safe from terrorist threats?

2015-05-12

UK’s Internet Bandwidth Could Soon Be Choked

Current optical cable and switches will reach their capacity for data throughput by 2020.

2015-05-30

Cyber Vulnerability - Get Your Report for 2015

The growing tide of cyber attacks has begun to spawn a new awareness of current cyber risks to business.

2015-05-12

NSA’s Public Spying Revealed by Snowden Is Ruled Illegal.

A landmark US federal court decision clears the way for a full legal challenge against the NSA. Does this mean Snowden is Innocent?

2015-05-08

How Mobility Is Revolutionising Manufacturing

Ten ways that mobilisation is going to dramatically change manufacturing industry.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

enSilo

enSilo

enSilo secures customers data on premise or in the cloud. Regardless of the where the threat comes from, enSilo can protect your data.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

HackersEra

HackersEra

HackersEra is a leading offensive cybersecurity service provider. We enable our clients to operate in a more secure environment efficiently and produce more value.

Menaya

Menaya

Menaya provide Ethical Hackers for leading companies while also providing cyber security solutions to help major infrastructures protect against cyber crime.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.