News

2018-10-17

British MoD Secrets Exposed In Dozens Of Breaches

Revealed: The Ministry of Defence and its partners failed to protect military and defence data in 37 cybersecurity incidents in 2017.

2018-10-19

It's Time To Embrace Blockchain Technology

It’s time for your business to start embracing blockchain, the biggest game-changer in technology since the Internet.

2018-10-22

Guide To All Things Criminal On The Web

An overview of the common kinds of cybercrime, with real-world examples and suggestions for tools you can use to protect yourself.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-17

Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

Governments in the Asia-Pacific region are strengthening their offensive capabilities in the fight against Chinese cyberwarfare.

2018-10-22

Algorithmic Warfare Is Coming. Humans Must Retain Control

Humanity is faced with a grave new reality – the rise of autonomous weapons, where wars are fought with algorithms. By Peter Maurer.

2018-10-22

Routers With Weak Passwords Will Soon Be Illegal In California

A new California law would make it illegal to sell Internet-connected devices that aren’t equipped with a unique password.

2018-10-17

Build A Young Cyber Security Team

Tapping into upcoming talent is the key to Melanie Oldham’s approach to building a cyber security workforce.

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-18

Corporate Cybercrime - A Hacker’s Point Of View

It only takes one cleverly worded email for hackers to attack your system from the inside out. Who are they and what do they stand to gain?

2018-10-15

Blockchain As A Service Market To Reach $7 Billion

A recent analysis by Bank of America suggests that blockchain adoption will soon become a multi-billions dollar business.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Towergate Insurance

Towergate Insurance

Towergate Insurance is a leading UK specialist insurance broker. Business products include Cyber Liability Insurance.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

NuSummit

NuSummit

NuSummit (formerly NSEIT) specializes in empowering financial services firms to navigate complex challenges with cutting-edge, technology-driven solutions.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

ThreatDefence

ThreatDefence

ThreatDefence provides innovative SIEM, SOC-as-a-Service, and proactive cyber defence solutions to MSP’s and Enterprises.

Brightside AI

Brightside AI

Brightside AI is a Swiss cybersecurity SaaS that helps teams combat AI-enabled phishing threats. Protect your team today.

Zally

Zally

Using advanced behavioural biometrics and AI, Zally is the world's answer to next-generation security.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.