News

2021-03-30

Facebook's Internal Content Rules Revealed

Facebook users are allowed to call for the death of public figures and can praise mass murders based on vague definitions of what constitutes a crime.

2021-03-29

Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals advise each other to say and do in case they get caught.

2021-04-01

New Cyber Security Measures To Protect US Energy

The US is launching new research programs to to safeguard the national energy system from the growing threat of cyber and physical hazards.

2021-03-30

NSA Will Hunt Cyber Attackers Inside The US

US Senators will support expanding the scope for the NSA and US Cyber Command to resume conducting intelligence gathering domestically.

2021-03-26

FBI 2020 Online Crime Report

The FBI says that the top three crimes reported by victims in 2020 were phishing scams, non-payment/non-delivery scams and extortion.

2021-03-26

Trump is Planning A Social Media Return

Following a permanent ban on Twitter and Facebook, Donald Trump will launch his own social media platform to express his views.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-24

Secure Your Personal Email & Social Media Accounts

Social Media Hacks: Facebook, Instagram and Snapchat were the most reported platforms on which people had their accounts compromised.

2021-03-24

Britain's Cyber Force Toughens Up

The National Cyber Force is being assembled to ‘detect, disrupt and deter’ adversaries as a key part of a new fully-formed British cyber strategy.

2021-03-24

2021 Blockchain Trends

Faster transactions, transparency and the absence of intermediaries, all mean that blockchain will become a dominant technology in many industries.

2021-03-23

The Iran-Russia Cyber Agreement & US Strategy In The Middle East

Cyber cooperation between Moscow and Tehran, while essentially defensive in nature, could pose several challenges to US cyber operations.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Zentek Digital Investigations

Zentek Digital Investigations

Zentek has been providing digital forensics services to the public and private sector for computers and mobile devices since 2004.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

KELA

KELA

KELA's powerful cybercrime intelligence platform uncovers and neutralizes the most relevant cybersecurity threats coming from the hardest-to-reach places on the internet.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Prelude Research

Prelude Research

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

Trustmi

Trustmi

Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7.