News

2015-01-29

Macro-based malware is making a comeback

For the past several months, different groups of attackers have distributed malware through Microsoft Office documents that contain malicious macros, reviving a technique that has been out of style for more than a decade.

2015-02-12

News organisations to develop Robot Journalists

In a development whose potential sinister consequences would be difficult to exaggerate, a number of major US news organisations have banded together in an alliance for the purpose of developing news gathering robots.

2015-02-12

Pirate Bay back online after Swedish raid

The notorious file-sharing website The Pirate Bay is back online more than seven weeks after Swedish police Comment in Stockholm and seized servers and computers, causing it to go dark.

2015-02-12

AI will not kill us, says Microsoft Research Chief

Microsoft Research's chief has said he thinks artificial intelligence systems could achieve consciousness, but has played down the threat to human life. Last December, Prof Stephen Hawking told the BBC that such machines could "spell the end of the human race".

2015-02-11

GCHQ spying on British citizens was unlawful

GCHQ unlawfully spied on British citizens, a secretive UK court has ruled.

2015-02-05

New Cyber Security School opening in London:

"Education is the most powerful tool we can use in the fight against cybercrime" said HP Enterprise CISO Andrea Simmons at the event launching the UK's newest cyber education centre.

2015-02-05

Research examines 'white hat' hackers in cyber warfare

From the Heartbleed bug that infected many popular websites and services, to the Target security breach that compromised 40 million credit cards, malicious hackers have proved to be detrimental to companies' financial assets and reputations.

2015-02-05

UK: New £3m cyber innovation centre in Gloucester

A new cyber innovation unit will open in Gloucester this week. Raytheon will officially launch the new unit, which has been set up to help protect computer networks from cyber attacks.

2015-02-05

Hackers For Hire

Have you ever wondered what fuels a hacker to invest his/her time, skills and resources into criminal activities? Is it for the money?

2015-02-05

Australia and US join forces in 'cyber war'

The US and Australia's alliance is looking to future battlefronts in cyber, hypersonic and electronic warfare, a US senior official says.

2015-02-05

The US and UK are to stage CyberWar against the Banks

The US and UK are to wage a series of cyber 'war games' against each other to test the resilience of the two country's defences against online criminals, beginning with a mock exercise directed at the banking and finance sector.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Roke

Roke

Roke is a leading UK innovator in science and engineering. For over 60 years we’ve been improving the world through innovation by combining the physical and digital in new ways.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

iFluids Engineering

iFluids Engineering

iFluids Engineering is a leading engineering consulting and risk management firm providing a full range of services including Cyber Security for Industrial Control Systems.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

CeTu

CeTu

CeTu - Data Orchestration for the Modern SOC. Strengthen security and optimize costs with the world's first AI-native platform for scaling and future-proofing your data stack.