News

2018-10-02

Machine Learning Algorithms & Police Decision-Making

Use of machine learning in police decision-making is in its infancy and the impact of algorithms on police officers’ actions is poorly understood.

2018-10-01

SMEs Risk Costs Of Up To $2.5m Following A Breach

Cisco say that larger organizations tend to be more resilient than SMEs after an attack as they have more resources for response and recovery.

2018-10-01

UK Newspaper Industry Demands Levy On Tech Firms

The British newspaper industry thinks that the government should force social media platforms like Facebook and Google to pay for journalism.

2018-10-01

NATO Can’t Agree On What A Cyber Attack Is

NATO member states have not reached consensus on how to actually count and categorise cyber incidents across the alliance.

2018-10-01

Major Facebook Breach: 50m Users Compromised

An attacker can take full control of the victim’s account, including logging into third-party applications that use Facebook Login.

2018-09-28

US Has Devastating Cyber Weapons

The crippling power of US cyber weapons will be deployed more often as authority for their use is moved further down the chain of command.

2018-09-28

UK Builds 2,000-Strong Offensive Cyber Force

Britain's ability to wage war in cyberspace is getting a massive boost with the creation of a new, 2,000-strong offensive cyberspace force.

2018-09-28

Fancy Bear Have A Nasty New Weapon

Russia’s 'Fancy Bear' hackers have new malware that’s virtually impossible to eradicate, capable of surviving a complete hard drive wipe.

2018-09-28

Hackers Stealing High Grade Academic Research

Iranian hackers obtained access to secure university systems and research databases by phishing university staff & using spoof domains.

2018-09-27

Hackers Are Fighting A Surrogate Cold War

Hybrid warfare incorporates cyber tactics focusing on soft targets, disrupting businesses & parts of the economy previously thought safe from attack.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Bounga Informatics

Bounga Informatics

Bounga Informatics provides Digital Forensics, E-Discovery, and Endpoint Security software, hardware, and training in Singapore and other countries in Asia Pacific.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

CYRISMA

CYRISMA

CYRISMA is a revolutionary cybersecurity platform that helps organizations manage risk without the usual headaches associated with enterprise cybersecurity tools.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.