Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

We focus on these types of services: Security Audits; Forensics and Incident Response; Malware Analysis and Reverse Engineering; Continuous Monitoring; and Security Training Services.

We serve organizations with particularly high intellectual property (IP) value, as well as critical data protection needs, including: software and technology companies; startups; airports; defense & homeland security; financial institutions; power generation and transmission; oil & gas facilities; refineries & the petrochemical industry; seaports; telecommunications; and water utilities.

Contact Information

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Purdicom

Purdicom

Purdicom, formerly known as Selcoms, is an award winning distributor specialising in Wireless, Cloud & Security technologies.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Vintegris

Vintegris

Víntegris designs, implements and manages information security infrastructures for Spain's leading financial institutions and large corporations.

Vericlave

Vericlave

At Vericlave we prevent cyberattacks on critical assets with a simple to deploy, proven solution that mitigates risks and addresses security challenges.

Verafin

Verafin

Verafin is one of the North American leaders in fraud detection and AML software.

Ingenio Global

Ingenio Global

Ingenio is a specialist recruitment business for technology professionals and operates a focused cybersecurity practice.

BCH Global

BCH Global

BCH Global is the cross-industry community of the world’s leading enterprise blockchain practitioners. The community is empowering the profession of Enterprise Blockchain Management.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.