News

2019-03-25

Three In Five Politicians’ Websites Don’t Use Cyber Security

A wide survey of politicians' websites across 37 countries finds that over 60% lack basic security measures.

2019-03-25

The US Navy Is Leaking Secrets

The US Navy is aware of cyber-attacks by foreign hackers but has failed to effectively respond or to warn its defense contractors of the danger.

2019-03-25

WordPress Comprises 90% Of Hacked Sites

WordPress accounts for the vast majority of compromised CMS platforms, with vulnerable plugins the prime attack vector.

2019-03-23

Bank of England Testing Banks' Cyber Resilience

Britain's banks will have to show they could recover from a cyber-attack within hours to avoid customer payments being delayed.

2019-03-21

Qbot Banking Malware Can Infect Cybersecurity Firms

A new variant of a banking malware known as Qbot rapidly mutates to stay ahead of anti-virus systems, even infecting some technology vendors.

2019-03-20

Knowing How Your Data Behaves Is The Key To Cybersecurity

Data is everywhere, however, securing that data has never been more critical, or more difficult. This means we need a new approach to security.

2019-03-20

Car Hacking & Data Collection

The amazing driver-assist mechanisms and must-have infotainment systems in many new cars are raising big concerns about safety and privacy.

2019-03-19

Triton Malware Is Spreading

A highly sophisticated form of industrial malware capable of remotely disabling safety systems with potentially catastrophic consequences.

2019-03-18

How To Develop Secure Cybersecurity Practices

Business leaders know that something needs to be done to limit their corporate risks and individual exposure and time isn’t on their side. Here's how.

2019-03-17

US Allies Don’t Agree With Trump Blocking Huawei

The Trump administration's push to block Chinese firm Huawei from their next-generation 5G wireless networks is facing skepticism in Europe.

2019-03-18

Knowledge For The Digital Age

4th Industrial Revolution: We are at the beginning of an electronic revolution that like earlier industrial revolutions will change our society.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CloudEndure

CloudEndure

CloudEndure offers Disaster Recovery and Continuous Replication for the Cloud.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

First Point Group (FPG)

First Point Group (FPG)

First Point Group provide a global technological recruitment service worldwide. Within that we have a specialist team of Cyber Security recruiters.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Federal Bureau of Investigation (FBI) - USA

Federal Bureau of Investigation (FBI) - USA

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.