FREE TO VIEW


« Back to News

2020-01-08

GozNym Malware Hackers Sentenced

Jailed: Three members of an international organised cybercrime group who used the GozNym banking Trojan to steal $100 million.

2020-01-08

Ten Predictions For Smart Cities

With $80 billion already invested, we can expect fewer IoT projects, more citizen input, and more communication between cars and infrastructure.

2020-01-07

Cyber Criminals Demand Ransom From Travelex

Hackers are holding foreign exchange company Travelex to ransom after a cyber-attack forced the firm to turn off all computer systems for 4 days.

2020-01-07

Cyber Spying For A Future War

Exposed: New information and communications technologies are beginning to profoundly affect how current and future wars will be waged.

2020-01-07

N.Korean Hackers Are Working With European Criminals

There is growing evidence that cyber criminals in Eastern Europe and skilled state-backed spies in North Korea are finding ways to work together.

2020-01-07

Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI say that Smart TV and other IoT devices can used by criminals to hack into home computer networks to rob you and spy on your family.

2020-01-07

Iran's Cyberwar Response To Its General's Killing

Military and cybersecurity analysts are warning that Iran's response could include, among other possibilities, a wave of disruptive cyberattacks.

2020-01-07

Top 20 Cyber Security Companies At The Start Of 2020

Here are 20 of the best cybersecurity companies: With different approaches, from mavericks to major brands, some known for other types of solutions.

2020-01-06

Few Businesses Are Ready For California’s New Consumer Data Privacy Law

The California Consumer Privacy Act has been effective since January 1st 2020 although it doesn’t look like everyone there is quite ready.

2020-01-06

The Invisible Areas Of The World Wide Web

After more than 20 years of online access the Internet is still in the early evolutionary stages. Some parts of it are visible and others are not.

2020-01-03

Cyber Attacks On Africa Are Soaring

Africa is widely considered the lowest ranked continent for cyber security, with the consequence of attracting a growing range of cyber threats.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Bufferzone Security

Bufferzone Security

BUFFERZONE® Safe Workspace® is a security suite based on Protection By Containment™, creating isolated virtual environments for safely accessing risky content.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Tempest

Tempest

TEMPEST is a leading provider of IT products and services including solutions for network and application security.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

Red4Sec

Red4Sec

Red4Sec are experts in ethical hacking, audits of web and mobile applications, code audits, cryptocurrency audits, perimeter security and incident response.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

Arkphire

Arkphire

Arkphire provide solutions across every aspect of IT to help your business perform better.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

QRC Assurance & Solutions

QRC Assurance & Solutions

QRC is a PCI QSA, QPA, ISO accredited, CPA and CERT-IN empanelled organization with vast experience in conducting certification, regulatory audits, pen testing services, training and more.