News

2017-02-03

Ransomware- Practical Advice To Protect & Recover Using Free Tools

There are concrete strategies & commercial tools available to use to protect yourself against ransomware attacks. By Dinesh Kumar Aggarwal

2017-01-30

Directors Report January 2017. Cyber Security Checklist For Management (£)

Cyber attacks are increasing and they are becoming both more focused and more damaging, targeting sensitive financial & commercial data.

2017-01-30

Hacker, Tailor, Soldier, Spy: Future Cyberwar

Lights Out: Someone wants the power down. Someone is sowing chaos and waiting to take advantage. This is how a cyber war begins.

2017-01-30

Director's Departure Leaves A Big Hole At GCHQ

The early departure of Robert Hannigan as UK’s GCHQ chief, marks not so much the end of an era as the transition between eras.

2017-01-26

Cyber Criminals Set to Get ‘Creative’ in 2017

KPMG think that IoT threats, new EU data laws and industrial scale cybercrime will be the dominant cybersecurity issues in 2017.

2017-01-25

UK Bank Fraud Landmark: TSB Repays Victim & Admits Giving Criminals Bank Accounts

British high street bank TSB has compensated a fraud victim on the grounds that it was at fault for allowing a criminal to operate a current account.

2017-01-27

British NHS Hospital Trust Under Cyber Attack

The largest National Health Service hospital trust in England has been infected with a virus affecting thousands of sensitive files.

2017-01-25

Defence Research Agency To Create Secure Data-Sharing Tech

DARPA is working on new ways to enable US troops working in remote areas to securely send and receive sensitive information on their devices.

2017-01-25

Nissan Self-Drive Trial Begins In London

Nissan will start testing its electric Leaf car with autonomous driving capabilities in London, beginning its first European trials on public roads.

2017-01-31

How Cyber Propaganda Influenced Politics in 2016

Fake News & Hackers: Throughout history, politically motivated threat actors have tried to influence public opinion to reach their goals.

2017-01-31

US Army Wants To 3D-Print Mini-Drones

Build It Yourself: Future soldiers will make their own eyes-in-the-sky on the go.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Ericom Software

Ericom Software

Ericom is a global leader in securing and connecting the digital workspace, offering solutions that secure browsing, and optimize desktop and application delivery to any device, anywhere.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

Knowledge Transfer Network (KTN)

Knowledge Transfer Network (KTN)

KTN links new ideas and opportunities with expertise, markets and finance through our network of businesses, universities, funders and investors.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

LOCH Technologies

LOCH Technologies

LOCH Wireless Machine Vision platform delivers next generation cybersecurity, performance monitoring, and cost management for all 5G and for broad-spectrum IoT, IoMT and OT wireless environments.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.

Neqst

Neqst

Neqst is an investment firm specialising in profitable growth companies within the Nordic software and IT-services sectors.

Seasia Infotech

Seasia Infotech

Seasia Infotech is a leader in offering efficient, tailor-made and comprehensive digital transformation services.