FREE TO VIEW


« Back to News

2019-09-03

Maritime Shipping Is Badly Exposed

Ships at sea are operating without effective cyber security measures in place, exposing critical vessel control systems to vulnerabilities.

2019-09-03

Extra-Terrestrial Hacking

NASA is reportedly investigating one of its astronauts in a case that appears to involve the first allegations of criminal hacking from space.

2019-09-04

Seven Cybersecurity Issues That Easily Go Unnoticed

Some cybersecurity issues and challenges can be harder to spot than others and it can lead to problems going unnoticed. By Chester Avey

2019-09-02

One $Million Stolen Every Minute

Every 60 seconds, 1,861 people in the USA are hit by cyber crimes and some states are much more risky than others. Alaska is a real hot spot.

2019-09-02

Five Features Of The Changing Threat Landscape

Organisations and critical infrastructure are likely to experience far more-destructive cyber-attacks, according to Accenture's 2019 Threat Report.

2019-09-02

Cyber Weapons Could Create Devastation Comparable To A Nuclear Strike

Cyber threats could be just as dangerous as a nuclear conflict, yet this is little understood by some governments and the public at large.

2019-09-02

A Major Breach In Biometrics Security Database

BioStar: Over a million fingerprints and other sensitive data including unencrypted usernames and passwords have been found exposed online.

2019-08-30

US Cyber Attack Disabled Iran’s Ability To Target Shipping

A strike by US CyberCommand has disabled a critical Iranian intelligence database, diminishing their ability to conduct covert attacks.

2019-08-30

One in Four Workers Would Steal Company Information

A quarter of IT employees surveyed say they would take company information to help apply for a job with a competitor.

2019-08-30

Webinar: JumpStart Guide to Application Security in AWS

September 11th. Join SANS, Fortinet, and AWS Marketplace to gain insights to help secure application delivery and deployment in the cloud.

2019-08-28

Its Your People Who Contribute To Data Breaches

Human error is a major factor in many cyber breaches. A more integrative and business-wide approach to cyber security training is required.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Blockchain Slovakia

Blockchain Slovakia

Blockchain Slovakia is a non-profit organization that brings together researchers, developers, entrepreneurs, regulators, investors and the public to support blockchain technology in Slovakia.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Buglab

Buglab

The Buglab contest and Vigilante Protocol help companies all over the world to discover and fix vulnerabilities on their digital solutions or assets.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

TechForing

TechForing

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Cyber1

Cyber1

CYBER1 is a leader in cyber security advisory and solutions. We are uniquely placed to help customers achieve cyber resilience and thus, safeguard reputation and value.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

Phylum

Phylum

Phylum provides powerful, automated software supply chain risk analysis that protects organizations, defends developers and enables secure innovation.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.