News

2015-03-24

UK Police Should Retry Gun Technology Sensors

ShotSpotter promises to save police having to hunt door-to-door in the vague vicinity of gunfire.

2015-03-24

Jobs for Cyber Superstars

Raytheon has emerged as an industry leader in developing Cyber resilience, and their Cyber specialists help other organisations develop their Cyber capabilities.

2015-03-23

Cyber War Exercise in Central London

Cyber defenders gathered in London to take part in a cyber terrorist attack simulation run by the Cyber Security Challenge UK.

2015-03-24

Europe’s Data Privacy Laws Annoy US Tech Companies

Europe is closer to approving new data-privacy legislation that threatens to raise tensions with US technology firms.

2015-03-24

Beware of the Militarization of Cyberspace

Numerous hacking campaigns have been uncovered by security firms. In many cases, they have been attributed to state-sponsored hackers.

2015-03-23

Metadata Will Kill Your Privacy

The UK government inquiry into whether it conducts mass surveillance and the legality of such an effort has recommended tighter controls on access to communications metadata.

2015-03-24

Internet of Lousy Things

Anticipation doesnt necessarily mean that we are going to have a good time with the Internet of Things.

2015-03-24

Despite Snowden Leaks, Internet use is Largely Unchanged

Some Internet users worried about protecting their privacy have made basic changes to their online activities, most have not.

2015-03-24

Anonymous and Security Agencies: Bedfellows for Good Against ISIS?

Opinion by Dr Martin Wright. Global Institute of Cyber, Intelligence & Security (GICIS)

2015-03-25

Hackers Extort S. Korea for Data on Nuclear Plants

A hacker who posted inside information on South Korea’s nuclear power plants has made fresh threats.

2015-03-23

Latest Insurance Hack Affects 11 Million Customers

Premera Blue Cross suffered a hack, exposing claims and clinical data affecting 11 million US customers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyren

Cyren

Cyren is a cloud-based, Internet security technology company providing threat detection and security analytics.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

Turkish Accreditation Agency (TURKAK)

Turkish Accreditation Agency (TURKAK)

TURKAK is the national accreditation body for Turkey. The directory of members provides details of organisations offering certification services for ISO 27001.

Wipe-Global

Wipe-Global

Wipe-Global is specialized in data erasure with an international established service partner network.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Netizen

Netizen

Netizen is an award-winning company that develops and leverages innovative solutions to enable a more secure cyberspace for clients in government and commercial markets.

Safetech Innovations

Safetech Innovations

Safetech Innovations is a team of cyber security experts, always at your service. We use human and cyber intelligence to help your business in uncertain times.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Techstep

Techstep

Techstep is a complete mobile technology enabler, making positive changes to the world of work; freeing people to work more effectively, securely and sustainably.

FastPassCorp

FastPassCorp

In the world of IT, identity theft is a growing concern. FastPass offers an innovative solution as a cloud or on-premises offering.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Cyber Command Pvt Ltd

Cyber Command Pvt Ltd

Cyber Command is your one-stop Cyber Security Service Provider, dedicated to delivering customized cybersecurity solutions that safeguard businesses from today's complex threat landscape.