News

2017-05-29

Three Cybersecurity Trends Business Should Address

The cybersecurity landscape grows more complex daily: Hackers unleash increasingly intricate & formidable attacks, on mission critical systems.

2017-05-29

UK Robotics, AI & 3D Printing

Winning the next industrial revolution is a big prize: a thriving manufacturing sector, highly skilled jobs & greater productivity, fueling growth.

2017-05-26

We Are Not Paid Agents of Russia…

The anonymous authors of Russian propaganda and fake news on Facebook and other social media do it for love, not money.

2017-05-17

Intelligence In The Age of Cyber Warfare

Today’s cyber threats are invisible and anonymous and this is causing a revolution in defence and security techniques.

2017-05-24

Google Neutralizes Phishing Scam

Quick Detection & Respone: A phishing scam used Google Docs in an attack against at least 1 million Gmail users.

2017-05-25

Government Sponsored Cyber-insecurity Is A Gift For Hackers

Governments themselves, via their intelligence agencies,are responsible for creating vulnerabilities in our communication networks.

2017-05-23

Uber Faces A Criminal Probe In The US

Ride-sharing firm Uber firm is accused of using "secret" software that lets it operate in regions where its service is banned or restricted.

2017-05-22

The Difference Between Cyberspace & The Internet

The two terms are sometimes used interchangeably, although they have different meanings.

2017-05-22

Cybersecurity Has A Serious Talent Shortage

Businesses should open themselves up to applicants whose non-traditional backgrounds mean they could bring challenging new ideas.

2017-05-19

EU Nations Expand Their Cyber Defences

More EU countries are working on strengthening their national security and cyber defence infrastructure.

2017-05-19

Police Innovative Reporting Technology

A new documentation and report system brings highly customised dictation and documentation capabilities to police officers on the move

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Israel National Cyber Directorate (INCD)

Israel National Cyber Directorate (INCD)

The Israel National Cyber Directorate is the national security and technological agency responsible for defending Israel’s national cyberspace and for establishing and advancing Israel’s cyber power.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

Open Connectivity Foundation (OCF)

Open Connectivity Foundation (OCF)

OCF is dedicated to ensuring secure interoperability ensuring secure interoperability of IoT for consumers, businesses and industries.

Arctic Wolf Networks

Arctic Wolf Networks

Arctic Wolf Networks delivers the industry-leading security operations center (SOC)-as-a-service that redefines the economics of cybersecurity.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

SubRosa Cyber Solutions

SubRosa Cyber Solutions

SubRosa Cyber Solutions solves its clients’ most tenacious information security, risk and compliance challenges through a multitude of information technology services and expertise.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

QPoint Technologies

QPoint Technologies

QPoint provides solutions and consulting in areas including software engineering, testing, cybersecurity, ICT, web, mobile, project management, and complex integration processes.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.