News

2017-10-30

Chinese & S. Korean Regulators Says ICO Investors At Risk

The up-and-coming method of raising funding via tokens based on the cryptocurrency Ethereum is unregulated with a huge potential for fraud.

2017-10-27

A New Approach To Combat Phishing

Major data breaches can start with a simple email. But providing employee training to combat phishing is a failing strategy.

2017-10-27

Facial Recognition Works on iPhone X. Sometimes.

The iPhone X might be the future of Apple’s smartphone design but its innovative Face ID struggles with under 13s, siblings or twins.

2017-10-27

Postmortem: WannaCry Ransomware Explained

WannaCry ransomware consists of multiple components infecting Windows operating systems. But the speed of its spread is something special.

2017-10-26

Innovation in Cloud-Based Video Analytics

Video analytics for the security industry is going through a rapid technological shift to smarter cloud-based, real-time and pro-active systems.

2017-10-26

Healthcare Suffers Most Cyber Security Incidents

McAfee say the healthcare industry is highly vulnerable and accounted for 26 percent of security incidents in the second quarter of 2017.

2017-10-26

US Asks China Not to Enforce Cybersecurity Law

The US has asked China not to implement its new cyber security law over concerns it could damage global trade in services.

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-25

Poor Coding Limits IS Hackers

Buggy Malware & Poor Encryption: Hackers working for Islamic State are bad at coding and and at hiding what they do.

2017-10-25

Nuclear Missiles Are Not N.Korea’s Only Threat

North Korea has launched 22 missiles in 15 tests in 2017. But the true risk is lies in its cyberattack capabilities, which are in very active service.

2017-10-24

Multicloud - The Next Step In Cloud Computing

Multicloud is an emerging pattern of use for cloud computing, when enterprises want to avoid dependence on a single public cloud provider.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

STMicroelectronics

STMicroelectronics

ST is a global semiconductor leader delivering intelligent and energy-efficient products and solutions that power the electronics at the heart of everyday life.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

ICT Reverse

ICT Reverse

ICT Reverse is one of the UK’s leading, fully accredited providers of ICT asset disposal and secure data erasure.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Siemens

Siemens

Siemens Industrial Security Services provide solutions for cybersecurity in automation environments based on the recommendations of the international standard IEC 62443.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

HyperSphere

HyperSphere

HyperSphere Data Protect is a patented technology establishing the world’s first cyberstorage solution designed to make data resilient against AI and quantum threats.

InstaSecure

InstaSecure

InstaSecure’s Preventive Cloud Controls accelerate alert remediation and strengthen cloud configurations. Set your controls once and prevent current and future risks.

Gray Tier Technologies (GTT)

Gray Tier Technologies (GTT)

Gray Tier is an advanced security company that focuses on developing technical solutions to the toughest cyber security challenges facing our customers.