News

2020-07-09

Maritime Data For Sale On the Dark Web

Two separate ransomware attacks on a major shipping firm highlight the need for improved cyber security training in the maritime industry.

2020-07-06

Journalist’s Phone Hacked Using An ‘Invisible’ Technique

The iPhone was infected by “network injection,” a fully automated technique which intercepts a cellular signal when it visits a website.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-07-06

Hackers Extort $1.14m From University of California

The University of California has paid a ransom of $1.14 million to hackers to restore encrypted data following an attack on its School of Medicine.

2020-07-03

Hong Kongers Erase Their Digital Footprints

Hong Kong residents hurry to alter their digital footprints or remove their presence entirely from social media to escape new Chinese security law.

2020-07-03

Police First Hack Then Demolish Organised Crime Gangs

Police arrest 800 people across Europe after shutting down the encrypted EncroChat platform, used by organised crime groups for drug deals.

2020-07-02

Artificial Intelligence – A Brief History

AI is technology that enables a computer to think or act in a more 'human' way. It has a long history and has recently made incredible advances.

2020-07-01

LinkedIn ‘Job Offers’ Targeted Aerospace & Military Personnel

A malware campaign used LinkedIn spear-phishing messages posing as recruiters to steal data from the military and aerospace executives.

2020-07-02

Webinar: How To Protect All AWS Services & Surfaces

July 16th, 2020 | Explore best practices and get practical guidance on implementing a multi-layer defense strategy for security in the cloud.

2020-07-01

Employees Are The Biggest Cyber Security Risk

Businesses are at constant risk from website data breaches, cyber attacks or malicious emails and employees can often be the biggest risk of all.

2020-06-30

Cloud Security Is Different

Migration to the Cloud for data and services has some risks that require new users to carefully rethink their approach to managing cyber security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Allianz Commercial

Allianz Commercial

Allianz Commercial is the center of expertise and global line of Allianz Group for insuring mid-sized businesses, large enterprises and specialist risks.

Fasoo

Fasoo

Fasoo provides data-centric security to protect data within the organizational perimeter and beyond by limiting access to sensitive data according to policies that cover both users and activities.

Data Security Council of India (DSCI)

Data Security Council of India (DSCI)

DSCI is a premier industry body on cyber security and data protection in India, committed to making the cyberspace safe, secure and trusted.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

CM Blockchain Security Center

CM Blockchain Security Center

We are dedicated to building a healthier blockchain ecosystem, providing solutions to security technology, and helping those who practice in the area of blockchain to get insight into industry trends.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

42Crunch

42Crunch

42Crunch provides API security testing and threat protection. We proactively test, fix and protect your APIs from development to runtime.

Kusari

Kusari

Securing your software supply chain starts with understanding. Kusari is on a mission to bring transparency to your software supply chain and power secure development.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.