News

2015-05-01

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home

According to Verizon the biggest threat to your private information may actually be you!

2015-05-08

Stellar Wind: CIA analysts didn’t use the NSA’s Spy program.

CIA surveillance & bulk data collection program was so secretive that the agency was unable to make “full use” of its capabilities.

2015-05-06

France’s Intelligence Bill: legalising mass surveillance

The French government claims its new Intelligence Bill is defined in opposition to the American and British models – Is it really?

2015-04-28

Largest U.S. Data Breaches in the Last 10 Years

A Telling Infographic: In 2014 alone more than 900 million data records were lost or stolen.

2015-04-30

How Terrorists Are Turning Robots Into Weapons

It's time to rethink security with the rise of robotics.

2015-04-28

IBM Watson is 'Moonshot' in Healthcare

Watson Health will offer cloud-based access to its IBM supercomputer for analyzing healthcare data.

2015-04-30

Cyber Security in China

Chinese Internet Security is a Key Location Factor and a Challenge to Western Businesses

2015-04-28

United Airlines Bans Researcher After 'joke tweet'

United Airlines ban a security researcher from a flight after he tweeted that he might be able to hack the aircraft's systems.

2015-04-29

NY Bank Regulator: Third Party Vendors Are a Backdoor to Hackers

A bank’s cyber security is often only as good as the cyber security of its vendors.

2015-04-30

How Can You Survive Cyber Warfare?

How to navigate the Internet without exposing yourself to attack.

2015-04-29

Cyber War Can Be Real War

The device is your computer, and the means of delivery of untold mayhem is the Internet.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

Edvance

Edvance

Edvance operates a range of cybersecurity businesses including value added cybersecurity solutions distribution, security technology innovation and development, and SaS solution offerings.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

Blok Cyber Security

Blok Cyber Security

Blok provide small businesses and sole traders, with affordable, managed Cyber Security Packages that offer immediate protection and peace of mind.

Phished

Phished

Phished is an AI-driven platform that focuses on the human side of cybersecurity. By combining fully automated training software with personalised, realistic simulations of cyberattacks.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Boltonshield

Boltonshield

Boltonshield provide a unique and proactive approach to cyber defence with managed security services, integrated technologies, and a team of security experts, ethical hackers and analysts.

Theori

Theori

Theori tackles the most difficult cybersecurity challenges from an attacker’s perspective and conquers them as the best strategic security experts.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.

Business Communications Inc (BCI)

Business Communications Inc (BCI)

BCI is a leading technology company known for its exceptional team of experienced engineers with a focus on providing top-notch technology and security products and services.