News

2018-03-26

Petty Criminals Have Use Of Sophisticated Hacking Tools

The experts at Cyberint say that hackers have started using sophisticated hacking tools and techniques once used only by nation states.

2018-03-26

UK Police Helping Business Fight Cyber Attacks

London's Metropolitan Police offer an innovative new exercise that teaches business leaders how to protect their companies from cyber-attacks.

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-23

Crypto Mining Malware Hits Business

Crypto-mining malware continues to impact organisations globally as 23% were affected by the Coinhive variant during January, say Check Point.

2018-03-22

Slingshot: Avoiding Sophisticated Cyber Espionage

Kaspersky has discovered a highly sophisticated cyber espionage campaign that spreads through compromised routers and can remain undetected.

2018-03-21

Cambridge Analytica Claim To Sway Elections With Facebook Data

If Cambridge Analytica can sway elections using a relatively small subset of Facebook’s data, what can Facebook do with the full set?

2018-03-23

About Strategic Threat Intelligence

Threat Intelligence informs you about potential malicious activity and helps you make better decisions about prevention of damaging attacks.

2018-03-22

Cybercrime Costs Londoners £26m Every Month

Scotland Yard say Londoners are losing an average of £26 million a month in cyber attacks on the capital's businesses and citizens.

2018-03-22

African Union HQ Building Bugged

Allegations of embedded espionage at the African Union’s HQ might prompt leaders to be more cautious about Chinese investment proposals.

2018-03-20

Cybersecurity At Sea

Cybersecurity demands board room level attention as well as vigilance from all employees, be they in head office or out on the water.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CyTech Services

CyTech Services

CyTech provides unique services and solutions complemented with professional subject matter experts to both the Federal and Commercial sectors.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Mitchell Sandham

Mitchell Sandham

Mitchell Sandham is an, independent insurance and financial services brokerage. Business products include Cyber/Privacy Liability insurance.

Compumatica

Compumatica

Compumatica is a leading European ICT security manufacturer for cybersecurity and encryption products. Solutions include network security, SCADA/ICS security, Mobile/BYOD and email encryption.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

Avira

Avira

Avira provide a portfolio of antivirus, security and performance applications for Windows, Android, Mac, and iOS.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

CSC Digital Brand Services

CSC Digital Brand Services

Our brand protection and security expertise give our customers peace of mind that no matter how fast the digital world changes, their intellectual property and digital assets will be secure.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Melius CyberSafe

Melius CyberSafe

Melius CyberSafe has developed a world-leading SaaS platform built around continuous assessment and improvement through vulnerability scanning and penetration testing.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

DH2i

DH2i

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

SafePaas

SafePaas

SafePaas is a leading Enterprise Risk Management Platform. One source of truth for all your Audit, Risk, and Compliance requirements. Complete governance across your systems.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.