News

2017-02-03

Big Data Analysis – Now Used For Politics…

Big data analysis has not only been contributing to decision making in the realms of business, health, and defense, but also in politics.

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

2017-02-01

Kaspersky Lab Employee Arrested On Treason Charges

A leading cybercrime investigator at top security firm Kaspersky Lab has been arrested in Russia where he could face charges for high treason.

2017-02-06

Autonomous Robots Will Deliver Your Lunch

Forget About Deliveroo: These robots are designed to work in a two to three- mile radius and make deliveries in 15 to 30 minutes.

2017-02-03

Stuxnet, Secrecy & The New Era of Cyber War

Should Cyber weapons be subject to international controls & protocols in the same way as nuclear and some other conventional weapons?

2017-02-06

Business Can Minimise Cybersecurity Risks And Drive Profit

CIOs are under pressure to deliver on the promise of digital technologies to transform customer-facing services & internal processes.

2017-02-03

Spanish Police Arrest Banking Malware Suspect

Spanish police have arrested a Russian programmer suspected of developing the Neverquest banking Trojan.

2017-02-01

New Technology To Really Close The US / Mexican Border

Despite President Trump’s executive orders to extend walls along the US-Mexico border, real border security will likely take longer than he thinks.

2017-02-01

True Extent Of UK Cybercrime & Fraud Revealed

The Crime Survey for England and Wales shows an estimated 3.6 million cases of fraud and 2 million computer misuse offences in a year.

2017-02-06

Artificial Intelligence Gives Business Wings

Solutions powered by AI will displace jobs with the biggest impact felt in transportation, logistics, customer service & consumer services.

2017-02-01

Emerging Details Of Cyber Assault On A Major UK Bank

Lloyds Bank admits it was was the target of a recent cyber attack which blocked a substantial number of customers using their online accounts.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Assuria

Assuria

Assuria Cyber Security solutions provide protective monitoring of systems and user activity across the whole IT infrastructure.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

Three Wire Systems

Three Wire Systems

Three Wire is a leader in innovative and efficient technology solutions for government agencies and large enterprise corporations.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Breathe Technology

Breathe Technology

Breathe Technology has been providing Managed IT Support/ Service Desk, Cloud Services, Cyber Security & Communications to businesses and schools since 2003.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

DeepStrike

DeepStrike

DeepStrike is a leading cybersecurity firm specializing in human-powered, high-quality penetration testing designed to protect businesses from evolving cyber threats.