News

2019-05-30

Hackers Steal Bitcoins Worth $41m

Hackers used a range of tools including viruses and phishing attacks to get security information allowing them to breach the Binance exchange.

2019-05-30

Cyber Threats And Nuclear Weapons Systems

Nuclear supply chains and nuclear command and control systems are at risk of being compromised and these risks must be urgently addressed.

2019-05-30

Limit The Duration Google Holds Your Data

Google has told developers that it will focus on security and privacy features, allowing users to place settings on how long their data is stored.

2019-05-28

Cyber Security Consultancy

A new service from Cyber Security Intelligence: Does your organisation need a cyber security strategy? We can help.

2019-05-29

MS Word Uses An AI Editor To Improve Your Writing

Microsoft has a new AI-powered feature that will help even the least confident of writers produce write more concise and readable text.

2019-05-28

Facebook Deserves To Be Broken-Up

An original collaborator with Mark Zuckerberg has turned against the giant social media platform that he helped create, over extremist content.

2019-05-27

Snowden Accuses CIA Of 'A PR Fix'

The CIA has set up its own website on the Dark Web. From safety in Moscow, Edward Snowden is unimpressed.

2019-05-17

British Hackers Convicted For Stealing £10m

The gang used malware to steal the email log-in details of businesses worldwide, to identify high-value financial transaction and divert money.

2019-05-17

G7 To Simulate Cross-Border Cyber Attack

Leading Western industrial powers will for the first time jointly simulate a major cross-border cybersecurity attack on the financial sector.

2019-05-15

Cyber-Attacks On Maritime Oil Tankers

Four oil tankers and a pipeline attacked near the Strait of Hormuz, using a combination of armed drones and GPS spoofing navigation software.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BruCON

BruCON

Brucon is Belgiums premium security and hacking conference.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Oman Technology Fund (OTF)

Oman Technology Fund (OTF)

Oman Technology Fund aims to make Oman the preferred destination for emerging tech companies in the region, and an attractive and stimulating destination for venture capital.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

ZeroThreat

ZeroThreat

ZeroThreat, a vulnerability scanning and automated pentesting tool, accelerates vulnerability detection 5x faster with unprecedented accuracy and efficiency in real-time.

WideField Security

WideField Security

WideField Security a venture backed cybersecurity startup helps enterprise protect their identity attack surface.

KIT365

KIT365

KIT365 aim to protect organisations against cyber security attacks, by mitigating the risk to their systems and information, and protecting their data and reputation.