News

2016-02-23

FBI's War On Encryption Is Unnecessary

The data trails we voluntarily leave allow IOT devices and social media networks to track us in ways the government can easily access.

2016-02-23

Why Aren’t Cyber Criminals Being Brought to Justice?

Cyber criminals are making off with $400 to $500 billion each year; why exactly are attackers getting away without being brought to justice?

2016-02-23

Data Security – The Trends We Do Not See Coming

With the emergence of the Internet of Things (IoT) and the Cloud the security industry is going through a time of challenge and re-invention.

2016-02-22

Women Write Better Computer Code Than Men

Computer code written by women has a higher approval rating than that written by men - but only if their gender is not identifiable.

2016-02-22

Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President

Hillary Clinton’s private server is currently in the possession of the FBI and she is under investigation over misusing classified information.

2016-02-22

Anonymous Hacks Thai and Turkey Police Stations

Anonymous hacktivists are trying to take justice into their own hands by direct action against Police & Security Services websites.

2016-02-19

NSA AI Technology May Have Targeted Innocents

The NSA has been using a machine-learning program to identify & target terrorists with deadly force, but its methodology may have been wrong.

2016-02-25

Nitro Zeus: The US Plan To Launch A Massive Cyber Attack On Iran

An elaborate plan for a cyberattack on Iran in case the diplomatic effort to limit its nuclear program failed and led to a military conflict.

2016-02-17

Banks Must React To FinTech

The financial sector is starting to innovate alongside the rest of the business world in response to emerging FinTech (Financial Technology).

2016-02-19

Brace Yourself For A Cyber-Tsunami

The power of technology to reshape the world is reaching historic levels.

2016-02-17

MIT Develops A Hack-Proof RFID Chip

Do you know about RFID chips and how many you are carrying at this moment? What actually is an RFID chip?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

FIDO Alliance

FIDO Alliance

FIDO Alliance is a non-profit organization formed to address the lack of interoperability among strong authentication devices.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Cyber Aware

Cyber Aware

Cyber Aware aims to drive behaviour change amongst small businesses and individuals, so that they adopt simple secure online behaviours.

ETAS

ETAS

ETAS (formerly Escrypt) is a pioneer and one of today’s leading solution providers for embedded IT security.

Cryptsoft

Cryptsoft

Cryptsoft provides key management and security software development toolkits based around open standards such as OASIS KMIP and PKCS#11.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Battery Ventures

Battery Ventures

Battery partners with talented founders and teams building category-defining businesses at all stages of growth.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

360 Advanced

360 Advanced

360 Advanced is a relationship-focused cybersecurity and compliance firm offering integrated compliance solutions customized to meet your business’ needs.

HazeGrayCyber

HazeGrayCyber

HazeGrayCyber offers comprehensive technical services to bring your company to the next level.