News

2023-05-10

Smart Gun Uses Facial Recognition Technology

James Bond's Pistol: A gun that can only be fired after verifying the shooter’s identity uses facial recognition and fingerprint technology.

2023-05-17

Google’s New Cyber Security Certificate Program

Careers: Google has a new six month entry-level US certification training program aimed at a new generation of cyber security professionals.

2023-05-17

Mobile Phone Chip Company Collects User’s Private Data

Leading Android chipmaker found uploading users' private data, including IP addresses to a cloud attributed to the company, without their consent.

2023-05-17

5G Renders Smart Cities More Vulnerable To Attacks

Smart Cities offer benefits like better efficiency and data-driven decision-making, but they may expose critical infrastructure and health & safety.

2023-05-16

British Banks Warn Of A Spike In Online Scams

Online Fraud: Britain's largest bank has issued an urgent warning about a new scam targeting customers affected by the cost of living crisis.

2023-05-12

The Dark Web Is A Big Cyber Security Threat

Criminal Playground: The Dark Web is used to organize and execute ransomware and DDoS attacks and to buy & sell illegally obtained sensitive data.

2023-05-10

Climate Change & Cyber Security

The Natural World & Cyber Security Are Connected: In fact, climate change could be one of the biggest security threats the planet faces.

2023-05-09

Malware Disguised As Legitimate Android Apps

Fluhorse: Malicious apps designed to extract sensitive information, including user credentials and Two-Factor Authentication codes.

2023-05-09

Insurers Must Pay Merck's $1.4B Losses For NotPetya

Court Ruling: Merck's insurers can't use an "act of war" clause to deny the pharmaceutical firm's claim for the cleanup costs after NotPetya attack.

2023-05-09

Challenges For CTOs In 2023

Being a CTO in 2023 has to be recognised as one of the most demanding yet fulfilling executive roles on the Board. By Chris Carreiro

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

Sparrow

Sparrow

Sparrow specializes in application security testing solutions to cope with new technology trends such as cloud, mobile, and DevSecOps.

MyCISO

MyCISO

MyCISO is the World’s first SaaS application that will vastly simplify security management for all.

NETAND

NETAND

NETAND privileged access and identity management solutions will secure your business from cyber threats.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.