News

2015-08-25

Japan: Court Rules Against Bitcoin Compensation

Tokyo District Court rules that the virtual currency Bitcoin is "not subject to ownership".

2015-08-25

Legal Issues Of Cyber War Are Big & Complex

What does it it take to trigger self-defense in cyberspace, and what does it mean for a nation-state to have 'effective control' of a hacker?

2015-08-25

Bitdefender Suffers Data Breach, Customer Records Stolen

Bitdefender has become the latest cybersecurity firm to be targeted by hackers.

2015-08-25

Cyber Attacks on the Power Grid

The protection of critical infrastructure like a power grid is an essential part of the cyber strategy of any Government.

2015-08-25

Addressing the Predictive Analytics Skills Gap

Organizations must pay attention to a variety of skills & how to combine them with technology to ensure success in using predictive analytics.

2015-08-24

How Uber Could Help Change Spycraft

Social media is an indicator of developments that the intelligence apparatus would never previously have had access to.

2015-08-24

Investors Pour $Billions in to Cybersecurity

Venture capital firms & corporate investors have put a record amount of money in to cybersecurity companies over the past year.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

2015-08-24

Ad Block Software 'Costs Firms £14bn A Year'

The economic impact of ad blocking is real and measurable

2015-08-21

Fraudsters Steal $46.7m From Ubiquiti Networks

Business E-mail Compromise (BEC) scam: The incident involved employee impersonation and fraudulent requests from an outside entity.

2015-08-21

When Your White Hat Is Really a Black Hat

Can you really trust all the people working for your company (or hired contractors) to protect sensitive data?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perspective Risk

Perspective Risk

Perspective Risk provides penetration testing, security assessments, risk management & compliance solutions, InfoSec training and consultancy services.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

OGiTiX

OGiTiX

OGiTiX Software AG is a German software manufacturer specializing in Identity and Access Management.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

Global Cyber Security Capacity Centre (GCSCC) - Oxford University

GCSCC's work is focused on developing a framework for understanding what works, what doesn’t work and why – across all areas of cybersecurity capacity.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Numen Cyber Technology

Numen Cyber Technology

Numen Cyber Technology is committed to becoming a Threat Discovery and Response expert for corporate customers.

Alethea

Alethea

Alethea is a technology company helping companies, nonprofits, and democracies protect themselves from harms stemming from disinformation and social media manipulation.

DerSecur

DerSecur

DerSecur has been engaged in advanced technology activities in the field of Application Security since 2011. We offer R&D technology solutions in the field of SAST, DAST and SCA analysis.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.

SGNL

SGNL

SGNL redefines identity-first security by integrating business context, closing critical gaps, and transforming how enterprises manage privileged access for a secure, adaptive future.

TorchLight

TorchLight

TorchLight designs and manages cybersecurity that moves at the speed of opportunity to defend against business risks and illuminate the path to security.

IdentifAI

IdentifAI

At identifAI, we develop cutting-edge AI solutions to combat the growing threats of deepfakes and fakenews.