FREE TO VIEW


« Back to News

2019-05-17

G7 To Simulate Cross-Border Cyber Attack

Leading Western industrial powers will for the first time jointly simulate a major cross-border cybersecurity attack on the financial sector.

2019-05-15

Cyber-Attacks On Maritime Oil Tankers

Four oil tankers and a pipeline attacked near the Strait of Hormuz, using a combination of armed drones and GPS spoofing navigation software.

2019-05-15

Britain To Initiate Online “Porn Ban’

The UK government intends to implement a “Porn Ban” nationwide on July 15, restricting access to online pornography for under 18s. But will it work?

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-14

Fake News Ahead Of EU Elections

The EU is experiencing a surge in information warfare in an attempt to sway the outcome of elections later this month.

2019-05-17

What's Your Data Strategy?

All businesses need a Data Strategy which encompasses audits, reviews their security, data protection & employee cyber awareness training.

2019-05-22

Hackers Don't Only Target Big Business

Specialist Insurers Hiscox find that hackers are shifting focus from larger companies and that SMEs are now equally vulnerable.

2019-05-22

Verizon 2019 Data Breach Report

No matter what defensive security measures are put in place, attackers can get through. Verizon's latest Data Breach Report confirms the problem.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-16

AI In Cyber Security Is Worth Almost $5B

The surge of cyber attacks is one of the prime growth factors behind the AI-driven cyber security market, currently valued at $4.94B.

2019-05-21

Young Hacker Makes $1m. Legally.

It Pays To Be Ethical: A 19-year-old Argentinian has made history as the first to earn over $1,000,000 in bug bounty awards.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Paramount Computer Systems

Paramount Computer Systems

Paramount is a regional leader in the Middle East for cybersecurity solutions and consulting services.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

NT Cyfence

NT Cyfence

CAT Cyfence is the IT Security services business unit of CAT Telecoms.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

Check Point SASE

Check Point SASE

Check Point SASE (formerly Perimeter 81) is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

DigiByte (DGB)

DigiByte (DGB)

DigiByte (DGB) is a rapidly growing global blockchain with a focus on cybersecurity for digital payments & decentralized applications.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

Sequoia Capital

Sequoia Capital

Sequoia Capital is a venture capital firm focused mainly on technology. We partner both with young companies finding their stride and established ones looking for growth.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

The Purple Guys

The Purple Guys

The Purple Guys offer Trouble-Free IT Support to businesses across the Central and Southern US. Safe and Secure, Rapid Response, Friendly Support that’s our Purple Promise.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.