News

2017-05-29

N. Korea Fires Another Ballistic Missile

North Korea has fired what appeared to be another ballistic missile

2017-06-07

WannaCry Was Not A Phishing Attack

Researchers at Malwarebytes say the WannaCry ransomware threat didn’t begin with malware-infected phishing emails, as first suspected.

2017-06-15

Sun Tzu's Art of Cyberwar

These ancient principles are still relevant to understanding the approach of attackers and to the defence of modern IT infrastructures.

2017-06-07

Hackers Hit Russian Bank Customers

Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.

2017-06-07

Stephen Fry: Facebook Classed as Publishers

Stephen Fry has called for Facebook and other “aggregating news agencies” to be reclassified as publishers in order to stop fake news and online abuse spreading by making social media subject to the same legal responsibilities as traditional news websites.

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

2017-06-15

Cambodia’s Cyber War Room

The concept of Fake News is really catching on and seems to be taking an important role in politics in Cambodia.

2017-06-14

What Makes A Cyber Criminal?

The UK’s National Crime Agency has published research on why some young people become involved in cybercrime. Its not about the money.

2017-06-05

How Social Media Influences Elections

With Facebook now a key electoral battleground, researchers are studying how automated accounts are used to alter political debate online.

2017-06-16

Guidance For Connected Vehicle Security

The Future Of Motoring: New forms of connectivity and relationships to cloud-based services, smart homes, even smart cites.

2017-06-08

Employees That Cause Data Breaches

When it comes to cybercrime, more and more companies are realising that trusted and trained employees pose an enormous threat.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

Secora Consulting

Secora Consulting

Secora Consulting is a professional services company specialising in tailored cybersecurity assessments and cyber advisory services.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Lattica

Lattica

Lattica provides a cryptography solution for privacy-preserving interaction with AI services.