News

2018-05-22

Trump Eliminates Top Cybersecurity Post

An expert to streamline & coordinated the various agencies of the US government is not being replaced.

2018-05-21

The Swiss Bank Where Robots Replace Employees

Process Automation: Why have seven employees work for three days when software robots can do the job instead?

2018-05-21

Secure Encrypted Email Platform PGP Is Not Secure

PGP as used by Edward Snowden was believed to be one of the most secure methods of protecting private email communications. That's not so.

2018-05-21

Ex-Employee Suspected Of Leaking CIA Hacking Tools

A CIA operative who worked on computer code used to spy on foreign adversaries is suspected of giving top-secret information to WikiLeaks.

2018-05-18

NSA Spies Triple Text and Phone Collection

The US intelligence agency collected 534 million domestic phone records last year, even though its bulk interception power is limited by federal law.

2018-05-18

'Cyber is Uncharted Territory And It’s Going To Get Worse…’

Investor Warren Buffet is worried his insurance business may suffer a disastrous claim for its insured cyber liabilities.

2018-05-18

How Do Hackers Hide Their IP Address?

Cyber-criminals could be operating from any part of the world and can remain untraceable because they can hide their IP addresses from prying eyes.

2018-05-18

China Is Behind A Decade Of Hacks On Software Companies

Chinese spy agencies are behind a decade of network intrusions using advanced malware to penetrate US, EU & Russian software companies.

2018-05-17

About Cyber Insurance

Following a sequence of international events featuring major data breaches, cyber insurance has really caught on. Here's a quick summary.

2018-05-17

Corporate Lawyers Brace For GDPR

In-house lawyers expect to play a greater role in cybersecurity as organisations brace themselves for the arrival of the GDPR data protection regime.

2018-05-16

Your Next Bank Card is a Finger-Scanner

Biometric Authentication: People may forget their PINs but very rarely do they go out without their fingers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

Quantum Generation

Quantum Generation

Quantum Cyber Security for a new age of communications. We are developing the largest decentralized orbital, and ground quantum mesh network based on blockchain technology.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

Internet Initiative Japan (IIJ)

Internet Initiative Japan (IIJ)

IIJ is one of Japan's leading Internet-access and comprehensive network solutions providers.