News

2015-07-06

Is The Tech Investment Bubble About To Burst ?

Is the tech industry is in denial about looming threats? There are sufficient indicators for those willing to open their eyes.

2015-07-06

Tough Rules Force Kenyan Net Users to List their Gadgets

Kenyans using public Wi-Fi to connect to the Internet will be required to register their mobile devices.

2015-07-03

Some Notes About Wassenaar

Wassenaar is an international arms control treaty which has recently added cyberweapons, with painful consequences for IT research.

2015-07-03

World Faces 'bloodless' Cyber War says India’s PM

"A Digital India where cyber security becomes an integral part of national security"

2015-07-03

Police campaign: UK Cybercrime Surges 27% in 2015

The 'Not With My Name' campaign will be highlighting advice focused on helping people protect their personal information.

2015-07-02

Merkel Bugged While Pondering Greece Crisis

Wikileaks release evidence that Chancellor Merkel's telephone calls are still being tapped.

2015-07-02

Court Briefly Returns NSA Surveillance Program

Has The USA Freedom Act really put an end to NSA's domestic bulk metadata collection? It seems not..

2015-07-02

Europol Tackles Cybercrime Ring

The cybercriminals attacked online banking systems, infecting machines, harvesting bank credentials & laundering money.

2015-06-30

Cyberwars Between Nations Are Difficult to Prove

The OPM attack is merely the latest of a number of high-profile hacking attacks and attributing blame is a challenge.

2015-06-30

Financial Institutions Face Increasing Cyber Attacks

Going Under: Cyber attacks on financial institutions are relentless in their frequency and severity.

2015-06-29

The Cybersecurity Company Helping Sony Fend Off Hackers

Bad news for everyone else is excellent news for those in the business of fighting such cyber villains.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Zayo

Zayo

Zayo is a leading global bandwidth infrastructure services provider for high-performance connectivity, secure colocation and flexible cloud services.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Ivanti

Ivanti

Ivanti provide user-centered IT solutions designed to increase user productivity while reducing IT security risk.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

CommScope

CommScope

CommScope is pushing the boundaries of technology to create the world’s most advanced wired and wireless networks.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.