News

2015-06-16

Australia is 'one of most aggressive' in Mass Surveillance

Snowden supporters say Australia’s new data retention laws are 'dangerous'.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

2015-06-16

PWC 2015 Information Security Breaches Survey

PWC survey aims to provide greater awareness amongst UK business on how companies are (not) mitigating cyber risks.

2015-06-16

GCHQ Lack Staff for 'umbrella' Cyber Surveillance

Do GCHQ have enough skilled people to carry out effective mass surveillance?

2015-06-16

Snowden Revelations Costly for US Tech Firms

US cloud computing firms could lose between $22 billion and $35 billion in overseas business.

2015-06-16

Russia Hacked The German Parliament

The German government says the hack of the Bundestag came from Russia in a state-sponsored attack.

2015-06-16

GCHQ uses Cyber Techniques Outlawed in US

GCHQ collects “bulk personal datasets” from millions of phone & internet records using techniques now banned in the US.

2015-06-16

‘Don’t Risk IT – Cyber Secure IT’

The 2015 ISBS Survey reveals that 90% of large organisations reported suffering a security breach, up from 81% in 2014.

2015-06-16

Seven Critical Criteria for Cloud Data Encryption

Encrypting the huge number of data files stored in a public cloud is like bubble-wrapping a house.

2015-06-16

Dark Web Drug Dealers Specialised in ‘party packs’

Convicted: Two drug traffickers, who ran a drug ‘party pack’ used the ‘Silk Road’ to move illegal drugs.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Netrix

Netrix

Netrix is a Mexican company specialized in IT Security, with more than 18 years of experience in Managed Services, Professional Services and Turnkey Solutions related to Security.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Cyber Science

Cyber Science

Cyber Science is the flagship conference of C-MRiC, focusing on pioneering research and innovation in Cyber Situational Awareness, Social Media, Cyber Security and Cyber Incident Response.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.