Contact Us

Company Information

Name: Cyber Security Intelligence Ltd

Online: www.CyberSecurityIntelligence.com

Twitter ID: CyberSecInt

Registered Office:
The Old Mill
Kings Mill
Kings Mill Lane
South Nutfield
Surrey
RH1 5NB
United Kingdom

Company Number:
8556206

VAT Registration number:
188098946

Directors:
Richard Heath
Alfred Rolington

Contact:
Email: info@cybersecurityintelligence.com
R Heath: 0771 5748491 / tim.heath@cybersecurityintelligence.com
A Rolington: 07428847988 / alfred.rolington@cybersecurityintelligence.com

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

BSIMM

BSIMM

The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

StackPath

StackPath

StackPath provide an intelligent web services platform designed for security, speed and scale.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Clusit

Clusit

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security.

Indusface

Indusface

Indusface offers best website security, web application firewall and SSL certificate to keep your online business much safer.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

CERT.lu

CERT.lu

CERT.lu is an initiative to enhance cyber security practices and techniques, and support security professionals in Luxembourg.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Dark Intelligence

Dark Intelligence

Dark Intelligence, created by Protective Intelligence, is the world’s first independent Dark Web Security Operations Centre.

Augmenta Cyber Security

Augmenta Cyber Security

Augmenta is a value driven preferred partner in assisting customers with complete cyber security solutions.

Binary Security

Binary Security

Binary Security's mission is to protect organisations and individuals from cyber-threats by providing quality, adaptive solutions using cutting edge knowledge and technologies.

HACKNER Security Intelligence

HACKNER Security Intelligence

HACKNER Security Intelligence is an independent security consultancy delivering comprehensive security assessments across IT security, physical security, and social engineering.