News

2016-06-16

Russian Hi-Tech Spy Devices

New Russian technologies, including phone call interception and a facial recognition app, have stirred a fierce debate about privacy & data monitoring.

2016-06-23

Managing The Rise Of The Killer Robots

Humanity stands at an inflection point as innovations in AI outpace evolution in governance mechanisms. Opinion By Anja Kaspersen

2016-06-15

Who’s Stealing The Money? SWIFT Tightens Security As A Fourth Bank Is Attacked.

The international bank money transfer system is suffering multiple attacks from a mystery assailant using the same type of code as used to hack Sony.

2016-06-15

Human Error Fuels Most Breaches

Many breaches are caused by methods of working that are known as data breach pitfalls.

2016-06-15

Harvard Business School Wants To Know How To Win At Cybersecurity

HBS graduates now running cybersecurity companies discuss the lessons they have learned and identify some solutions.

2016-06-15

Tor’s Developer Leaves After Lurid Sexual Allegations

Senior Tor developer, Wikileaks hacker and Snowden advocate is forced to resign after rumors of assault emerged online.

2016-06-14

How To Define Cyberwar

What is it that is keeping US Intelligence and Military chiefs awake at night?

2016-06-14

Cyber Insurance Report 2016 (£)

The recent growing tide of cyber-attacks has begun to spawn a new awareness of the current cyber risks to business. Companies need to take a new approach.

2016-06-14

Cyber Strategies for the New Digital Revolution (£)

As the analysis reaches deeper behind the recent Paris attacks in 2015, it has become clear that terrorism today is a widening series of global alliances often assisted and connected via cyber social media and electronic propaganda.

2016-06-14

How Boards Should Deal with Cyber Threats (£)

Businesses must take more time and thought about their online assets and how they are affected by cyber threats.

2016-06-14

Internet Power: Self Radicalisation & The Orlando Massacre

The Orlando gunman appears to have been motivated to kill by remote propaganda via the internet and social media.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

ImagineX Consulting

ImagineX Consulting

ImagineX Consulting is a cybersecurity-focused boutique technology consultancy whose mission is to help our clients #BeBetter by reducing their corporate risk.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.

Maze

Maze

At Maze, we’re dedicated to changing how security teams understand and act on vulnerabilities — especially in cloud and application environments.