News

2016-05-26

March Of The Machines

The world stands on the brink of a 4th industrial revolution, not just about manufacturing or automation but transforming services & professions.

2016-05-25

Cyberwar: The Smart Person's Guide

Cyberwarfare is real. Governments are spending £billions making sure they can fight battles on the internet & you might get caught in the crossfire.

2016-05-24

Google Hiring People To Test Self-Driving Cars

Help Wanted: Strong nerves and the ability to give concise engineering feedback required.

2016-05-19

China Denounces Pentagon Cyberwarfare Report

China does not like a new new US Defense Department report that puts a spotlight on cyberwarfare.

2016-05-18

Britain’s Border Control Systems Keep Falling Over

The system that provides a critical additional layer of security by screening all passengers against lists of suspected individuals is not reliable.

2016-05-19

Anonymous Declares War On Global Banks

Operation Icarus: The hacking collective Anonymous has launched a thirty-day campaign against global banks..

2016-05-18

Russian Hackers Try To Attack German Governing Party.

Pawn Storm hackers appear to be trying to steal personal and corporate data from the governing CDU party and other high-profile individuals.

2016-05-16

Think You Know Your Customers? Try Authenticating Them

Customer demands are increasing and changing rapidly, forcing companies to adopt new technologies that scale with their business security needs.

2016-05-18

International Co-Operation: Challenges & Potential For Engaging In Cyberspace

International norms in cyber security are headed into a period of turbulence. Opinion by Jamie Collier

2016-05-17

Syrian Government Hacked

Mystery group named Cyber Justice Team hacked the Syrian National Agency for Network Services and dumped the stolen data.

2016-05-18

Ransomware Everywhere: What’s The Technology Behind It?

According to the FBI, US companies paid $25 million in ransom last year, and it expects the 2016 total to be more than $200 million.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Tiro Security

Tiro Security

Tiro Security is a boutique company specializing in information security and IT audit recruitment and solutions.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

KvantPhone

KvantPhone

KvantPhone (formerly CryptTalk) is an easy-to-use, quantum resistant secure communication service designed for businesses and large organizations.

Haltdos

Haltdos

Haltdos is an AI driven website protection service that secures websites against today's cyber threats.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

OX Security

OX Security

OX is a DevOps software supply chain security solution. Teams can verify the integrity and security of every artifact using a pipeline bill of materials (PBOM).

Mode

Mode

Mode is an out-of-band communication and crisis collaboration platform. One platform to manage your cyber crisis response. Stay connected when it's needed most.