News

2015-03-18

Some Email Truths for Hillary Clinton

One thing the US Presidential candidate should know is that armed guards aren’t really equipped to stop a data breach.

2015-03-18

The Internet Of Things TransForms Three Industries!

How the Internet of Things (IoT) can make our day-to-day activities more comfortable, productive and efficient.

2015-03-18

Europe Could See Beginning Of Two-Tier Internet

EU Politicians are planning a two-tier Internet in Europe

2015-03-13

CIA 'tried to crack security of Apple devices'

US spy agency tried to create dummy version of development software that would allow it to insert surveillance back doors into apps.

2015-03-17

GCHQ Spying Wasn't Illegal, it Just ‘Lacked Transparency’…

UK data surveillance programs, including the bulk collection of data from ISPs, have been declared legal by a parliamentary committee.

2015-03-14

It's only a Matter of Time Before a Drone Kills Someone

This is the stark warning issued by the Institute of Electronics and Electrical Engineering (IEEE) recently at Mobile World Congress (MWC).

2015-03-08

How do we police the digital age?

Opinion by Giles Herdale - Essex Police National Lead on Digital Intelligence & Investigation Strategy.

2015-03-08

The Dark Web: anarchy, law, freedom and anonymity

The Deep Web is of intense interest to people who want to avoid government spies and law enforcement.

2015-03-10

Private Equity and Cyber Security: The 3 Weak Points

Private equity COOs and managing partners should consider the three main areas of the private equity business model that are susceptible to cyber attack:

2015-03-09

How you could become a victim of cybercrime in 2015

Cybersecurity experts' predictions for the year ahead:

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Crosscheck Networks

Crosscheck Networks

Crosscheck products allow you to test your APIs across different protocols and message formats with functional automation, performance, and security testing capabilities.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

11:11 Systems

11:11 Systems

11:11 Systems synchronizes every aspect of network services for your business. Build your network with the industry’s most trusted expert skills.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.