News

2017-05-12

Cyber Spies Go Mainstream

Cyber espionage appears to have hit the mainstream as the most popular attack method in the public sector, education & manufacturing industries.

2017-05-12

Macron Hackers Linked To Russian Intelligence

President Macron's campaign team used some effective countermeasures to diminish the impact of a stolen data dump on their candidate.

2017-05-12

Cybersecurity Has A Metrics Problem

Building security metrics, measuring risk and improving cyber incident communications in your organisation aren’t “one and done” processes.

2017-05-12

Hackers Stole A £60,000 BMW

Using only a signal boosting device hidden in a plastic bag, thieves were able to unlock a modern BMW car and drive away.

2017-05-11

NATO Cyber War Games 2017: Czechs Win

The Czech team won Locked Shields, NATO's international live-fire cyber defence exercise.The US Team were only midfield.

2017-05-10

The Cybersecurity Threats That Keep Banks Alert

People in charge of vast volumes of valuable financial data are under increasing pressure to keep customer data safe from hackers & fraudsters.

2017-05-10

Malware: Eyes On North Korea

KONNI malware allows the operator to steal files, keystrokes, perform screenshots and execute arbitrary code on the infected host.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-06

Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack"

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-04

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows

Gone are the days when spy agencies did not officially exist and their personnel & activities were hidden away from public view. By Jamie Collier

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Awake Security

Awake Security

Awake Security offer a security solution built on an AI platform that acts like the human brain to sense, detect, and respond to threats you may not even know exist.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

Emantra

Emantra

Emantra specialises in the enablement of Secure Cloud services through it’s comprehensive Sovereign Cloud Hosting, Secure Access Service Edge, and managed services.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.