News

2019-03-06

Cyber Command’s Plan to ‘frustrate’ Hackers Is Working

Defend Forward: US cyber soldiers have found ways to let foreign nation-state hackers know they are being watched and can be intercepted.

2019-03-05

Four Ways That Fake-News Sites Trick People

Fake-news sites are successful because many people believe and then share their false reports. How can social media users avoid being misled?

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

2019-03-05

Dating Sites Fraudster Alert

Romance fraudsters target lonely hearts using dating sites. Not only will they steal your heart, they will steal your money and your identification.

2019-02-20

Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-03-05

Edward Snowden Likes Zcash

Unbothered by the repressive regime where he lives in Moscow, Edward Snowden has expressed support for a controversial new cryptocurrency.

2019-03-04

The US Military Has A Free Rein For Offensive Hacking

The Trump administration made it easier for the US military to conduct offensive cyber operations. But this new authority should be used carefully.

2019-03-04

Facebook Has Changed Computing

Many of the apps and services we use every day are built with technologies that Facebook developed and then shared with the world.

2019-03-04

Trump Wants US Government To Prioritise AI

President Trumps instructs US Federal Agencies to focus on AI to help promote US industrial development.

2019-02-20

Apple ‘Subscription Confirmation’ Phishing Scam

Apple users should be alert to a new phishing scam designed to trick them into handing over personal financial information to online criminals.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

boxxe

boxxe

boxxe create flexible IT infrastructures, collaborative global workspaces and data clarity, all underpinned by world-leading security.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Rausch Advisory Services

Rausch Advisory Services

Rausch delivers solutions that address compliance, enterprise risk, information technology and human resource capital.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Technology Innovation Institute (TII)

Technology Innovation Institute (TII)

TII is a UAE-based research center that aims to lead global advances in AI, robotics, quantum computing, cryptography and secure communications and more.

Virtual Cyber Labs

Virtual Cyber Labs

Virtual Cyber Labs is a 21st generation Cybersecurity Edu-Tech company that offers an all-in-one hub including custom syllabus and labs.

UrbanFox

UrbanFox

UrbanFox’ powerful AI provides a simple and intuitive way to reduce fraud risk, whilst isolating potential fraudsters that cost your business money.