News

2019-11-05

Hackers Demand Ransom After Stealing Johannesburg's Data

The attack on South Africa’s financial centre, accounting for 16% of national GDP has delivered a noticeable blow to the country’s economy.

2019-11-04

2020 Will Be A Landmark Year For AI

Ways are being found to fuse Artificial Intelligence with other systems more effectively. Transport, healthcare, finance & cybersecurity are in play.

2019-11-04

Russia Will Try Leaving The Global Internet

Cyber Sovereignty or Virtual Iron Curtain? Russia will test its internal RuNet network to see if the country can function outside the global Internet.

2019-11-04

A £370m Investment To Boost AI In Britain

Big companies, universities and government have combined to invest in artificial intelligence, with a focus on researching applications in Healthcare.

2019-11-01

Cyber Security Training That Employees Don’t Hate

Most employees hate taking cyber security awareness training but it doesn’t have to be that way. There are several ways to help them love it.

2019-11-01

Cyber Training For Every US Federal Employee

One US politician wants every federal employee to know how to securely interact with technology, including Internet-connected devices.

2019-11-01

GDPR Lessons Learned

Uncertainty and contradictions have defined the first year of General Data Protection Regulation (GDPR) enforcement. By Simon Fogg

2019-11-01

Cyber Intelligence & Business Strategy

The planet’s interconnected population will grow from 3.7 to 5 billion over the next 10 years and this has profound consequences for business.

2019-10-31

Facebook, Free Speech & Fake News

Arbiters Of Truth: Twitter's decision to cease political advertising renews pressure on Facebook to control the flow of fake news across its platform.

2019-10-30

Facebook Sues Over Spyware Planted On WhatsApp

Facebook turns aggressive and has filed legal action in California against Israeli NSO Group for allegedly hacking WhatsApp.

2019-10-30

Georgia Suffers A Nationwide Cyber Attack

The national TV station, justice system, thousands of websites including private companies, knocked offline and replaced with a threatening message.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

Bolton Labs

Bolton Labs

Bolton Labs is a leading provider cybersecurity services, tools, and analysis for MSPs and organizations who want to scale their security offerings.

TÜV Informationstechnik (TÜViT)

TÜV Informationstechnik (TÜViT)

TÜViT is a leading service provider in the IT sector offering unbiased and independent tests and certifications of IT products, hardware, software, systems and processes.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

MythX

MythX

MythX is the premier security analysis service for Ethereum smart contracts.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Amnesty Tech

Amnesty Tech

Amnesty Tech's Security Lab leads technical investigations into cyber-attacks against civil society and provides critical support when individuals face such attacks.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Cloudbox

Cloudbox

Cloudbox build and maintain a highly secure, compliant IT infrastructure for our clients – with total peace of mind – so they can focus on the market.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.