News

2018-06-20

With Robots In Control, Chemical Makers Fight For Formula Ownership

Industrial robots are absorbing huge quantities of sensitive data from both manufacturers and customers, modifying key formulations as they go.

2018-06-20

How To Use AI & Predictive Analytics

Anticipate and prevent storage infrastructure problems by combining flash storage with cutting-edge predictive technology.

2018-06-20

Zambia Wants Tough New Online Regulations

Like some other African states, Zambia plans new laws governing online behaviour with severe penalties and a new Cybersecurity Agency.

2018-06-20

Five Mistakes US Cyberscurity Vendors Make In The UK

Despite the similarities, many vendors fall at the first hurdle by failing to account for some important differences in the UK market.

2018-06-19

Trump / Kim Summit Attracts A Heavy Wave of Cyber Attacks

Cyberattacks targeting Singapore skyrocketed during the Trump / Kim summit meeting, with 88% originating from Russia.

2018-06-19

Deloitte To Invest £430 Million On Cybersecurity Defences

The leading cybersecurity consulting firm has been embarrassed by recent breaches and plans to make a big investment in expanding its services.

2018-06-19

British Universities Have Many Cyber Threats

IT security is not a new challenge for universities but with GDPR it is expected that universities will become more strictly liable for data breaches.

2018-06-19

Business AI Platform For Commercial Development

Some say that tackling business uncertainty can be greatly assisted by artificial intelligence, but it is a many-layered and complex process.

2018-06-18

How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec's mosque shooter provided insight on police use of computers to extract information about a suspect.

2018-06-19

Cryptocurrency Malware Theft Is Worth Millions

The market for malware and tools designed specifically for the theft of cryptocurrency is booming with $1.1 billion stolen this year.

2018-06-18

Profile Of An Ethical Bug Hunter

Ethical hacking has moved on from academic researchers and lone wolf hackers and has become a big business, in the form of bug hunting.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

Nuspire

Nuspire

Nuspire provide services to protect your network with best-in-class managed detection and response, allowing you to stay focused on managing your business.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.