News

2015-10-12

Reinventing CIA for the Big Data Era

The CIA has a new Directorate for Digital Innovation to deal with turning the vast amounts of data the agency collects into useful insights.

2015-10-12

Social Media Firms 'Undermine' Police Investigating Terrorism

Britain's most senior counter-terror police officer says social media firms are putting lives at risk by refusing to co-operate with investigations.

2015-10-15

UK Police Ignore Most Cyber Crime

Around 70 per cent of all frauds are carried out online, with many criminals based overseas - making it difficult for police to pursue a case.

2015-10-12

Global Nuclear Facilities 'at risk' of Cyber Attack

The civil nuclear infrastructure in most nations is not well prepared to defend against attack.

2015-10-12

GCHQ Can Hack My Smartphone Using a Bunch of Smurfs

Dreamy, Nosey, Tracker and Paranoid - the unlikely team of GCHQ avatars that can power remote surveillance & control of mobile phones.

2015-10-09

Safe Harbour No More. Facebook Data Transfer Deal Is Ruled Invalid

EU Court of Justice rule the 'Safe Harbour' agreement that companies have relied on to move personal data across the Atlantic is invalid.

2015-10-08

Snowden : Smartphones Can Be Remotely Controlled

Smartphone users can do "very little" to stop security services getting "total control" over their devices, says Edward Snowden.

2015-10-07

The Rules of Cyberspace Just Got A Bit Clearer

United Nations has made recommendations guiding state activity in cyberspace which break new ground.

2015-10-07

Where’s The Money in Data?

How do we use data to drive revenue?

2015-10-12

Cyber Insurance Policies: Worth the Money?

The global cyber insurance market is expected to triple in size, reaching an estimated $7.5 billion in annual premiums by the year 2020.

2015-09-18

Bitcoin Made Official by US Trade Commission

The US Commodity Futures Trading Commission has ordered that bitcoin be treated as an official commodity and regulated accordingly.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

International Security Management Association (ISMA)

International Security Management Association (ISMA)

ISMA is an international security association of senior security executives from major business organizations located worldwide.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Fedco International

Fedco International

Fedco International is an IT and SCADA ICS Security consultancy firm.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Bluerydge

Bluerydge

Bluerydge specialises in cyber security and technology, focusing on the delivery of innovative sovereign solutions through trusted, cleared and experienced professionals.

RANE Network

RANE Network

RANE is a global risk intelligence company that provides critical insights and analysis to more efficiently anticipate, monitor, and respond to emerging threats.