News

2022-07-15

Suspicions That Explosion At US Gas Export Terminal Caused By Russian Hackers

Was the Freeport Liquified Natural Gas explosion that forced Europe to keep buying Russian gas a Control System cyber attack? By Joe Weiss

2022-07-12

Creating A Security Awareness Training Program

Are you responsible for the information assets of your organization? Then you need an effective security awareness training program. By Stacie Orlandi

2022-07-13

N.Korean Hackers Target US Health Providers With Ransomware

CISA Points The Finger: The US security agency recommends that companies in the healthcare industry take a zero-trust, identity first approach.

2022-07-13

Exposed: Sensitive Data Of 146,000 Aon Customers

The commercial insurance giant, Aon, calls itself the 'go-to cyber response team.' But hackers breached its systems for well over a year.

2022-07-13

New Scanning Tool Protects Websites From Attack

A 'black box' prototype is more effective than existing web scanners, which collectively fail to detect the top 10 weaknesses in web applications. 

2022-07-12

Creating A Culture Of Cyber Security Throughout An Organisation

Some CISOs struggle to gain immediate internal acceptance of cyber security initiatives. It's really a two-way process. By Michael Cantor

2022-07-12

Elon Musk Isn't Buying Twitter

Musk says he wants to back out of the $44B deal because Twitter has failed to provide enough information about fake & spam accounts. 

2022-07-12

Chainalysis Crypto Theft Hotline

Crypto Incident Response: The service is for victims of a hack or ransomware attack in which crypto currency is either demanded or stolen.

2022-08-04

History Of Cyber Crime - Part 3 - Overview

The ecosystem of cyber crime is in constant transformation, but it is not a technological issue. It's really a problem with human behaviour.

2022-07-11

Who Was Responsible For Hacking Both IBM & Stanford University?

Hackers aim to deliver a module containing hidden desktop takeover capabilities by exploiting clicks on seeming innocuous advertisements.

2022-07-20

How Do You Solve A Problem Like The Cyber Security Skills Gap?

The Human Element: It may come as a surprise to some people, but cyber security is not about technology - it's about people. By Rob Demain

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

Plixer

Plixer

Plixer delivers a network traffic analytics system used for monitoring, visualization, and reporting of network and security incidents.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.

aiComply

aiComply

aiComply's AI-driven platform offers automated intelligence for an efficient cybersecurity compliance workflow, eliminating onerous manual and time-consuming paperwork.

AZCOMP Technologies

AZCOMP Technologies

AZCOMP provide professional network security consulting services as well as network security auditing and assessments.