News

2019-07-09

China’s Dirty Secret - Intellectual Property Theft

Hackers have stolen masses of corporate and government secrets, with the aim to improve Chinese business and economic competitiveness.

2019-07-08

Phishing, Malware & Cyber Security in Australia

More robocalls, more suspicious emails and decreased cyber security. Australians find themselves in the frontline against cyberecrime.

2019-07-08

Cyber Attacks On The British Financial Sector Increasing Fast

A significant rise in outages and cyber-attacks affecting financial services firms over the past year suggests there are some fundamental problems.

2019-07-08

Developing Smart Cities In Practice

Security and privacy issues plus a lack of IoT interoperability are seen as a major factors in speeding deployment of Smart City technology.

2019-07-05

20m Jobs Will Become Robotic By 2030

The impact of automation, AI and the IoT will be huge. One forecast is for 20 million fewer jobs and 500 billion connected devices in 2030.

2019-06-25

Clayden Law: GPPR Is 1-Year Old

An Guide To GDPR From Clayden Law: Experts in Information Technology, Data Privacy & Cyber Security.

2019-07-04

Iran’s Cyber Threat to Germany

Tehran is emerging as a major cyber security threat to Germany and the West, the German intelligence service has warned.

2019-07-03

30% Of Business Leaders Would Pay Ransom

A third of organisations would consider paying a ransom to an attacker instead of investing in cybersecurity, as they believe it is cheaper.

2019-07-03

Malboard Exploit Mimics A User’s Keystrokes

Malware researchers have developed a new attack method which avoids detection by mimicing a user’s personalised keystroke characteristics.

2019-07-03

GDPR Is Now 1-Year Old

Clayden Law's Guide to GDPR: One year after its introduction, now is a very good time for organisations to review their GDPR compliance.

2019-07-03

US Attackers Target Iran's Defense Networks

US Cyber Command is reported to have found a way to penetrate Iranian military networks to attack and neutralise air defense missile systems.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

CISO Global

CISO Global

CISO Global (formerly Cerberus Sentinel) are on a mission to demystify and accelerate our clients’ journey to cyber resilience, empowering organizations to securely grow, operate, and innovate.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.