FREE TO VIEW


« Back to News

2018-08-23

An Election Interference Alert System

An early warning system being developed to spot attempts to subvert elections by searching out fake news & propaganda would be easily thwarted.

2018-08-22

Blockchain In Plain English

What is Blockchain really all about? In an attempt to make this definition as simple as possible, Blockchain automates trust.

2018-08-22

Cybersecurity Jumps Up The Corporate Agenda

Security experts are more worried about data breaches than ever, with most fearing Meltdown-Spectre type attacks will become the new normal.

2018-08-21

Phishing Tools Used To Attack The Power Grid

Russian hackers penetrated hundreds of US utilities, manufacturing plants gained access by using the most conventional of phishing tools.

2018-08-21

The Impact Of Economic Espionage

An official US Government report highlights current threats and future trends in foreign intelligence efforts to steal trade secrets.

2018-08-20

Hackers Can Buy Tools To Attack Your Business For $40

An analysis of 25 DarkWeb sites examined the costs to buy cybercrime tools & services to carry out both simple and more complex attacks.

2018-08-20

Malware – The Hateful Eight

Thesaurus Part 2: This concise malware bestiary will help you get your malware terms right when you hang out with the experts.

2018-08-17

Blackmail Emails Demand Bitcoin Payment

The sender threatens that if you do not pay $1000 in Bitcoin within one day then compromising video will be sent to all of your contacts.

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

2018-08-16

Hacking Your Holiday: Cyber Criminals Target Tourism

Last year there were 3.9 billion malicious login attempts on sites belonging to airlines, cruise lines, hotels, travel, car rental & transport organisations.

2018-08-16

GMail Users Warned Of Vulnerability

Confidential Mode: GMail users have been alerted about a new Google Mail feature which can be exploited to carry out a wave of scams.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Identiv

Identiv

Identiv is a global security technology company that establishes trust in the connected world, including premises, information and everyday items.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

Cyberlitica

Cyberlitica

Cyberlitica (formerly iPhish) provides a Workforce Threat Intelligence application that significantly augments companies’ cyber threat prevention efforts.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

PQShield

PQShield

PQShield are specialists in Post-Quantum Cryptography. We provide quantum-secure cryptographic solutions for software, software/hardware co-design and data in transit.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

Third Point Ventures

Third Point Ventures

Third Point brings deep technical expertise, a strong network of relationships, and decades of investing experience to add value to our partners throughout their journey from idea to IPO and beyond.

SoftForum

SoftForum

SoftForum is a company specializing in next-generation information security solutions in the Quantum-Resistant-Cryptography (PQC) field.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.

Trium Cyber

Trium Cyber

Trium Cyber - Expert Cyber Underwriting and Claims Management. Based in the US and UK. Backed by Lloyd’s of London.

CarbonHelix

CarbonHelix

CarbonHelix provides cybersecurity services from US-based security operations centers that meet the highest compliance requirements.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.