News

2017-03-29

Drones For Rail & Road Tunnel Inspections

Road & rail tunnels must be inspected regularly to detect anomalies. Singapore thinks drones can replace manned inspection teams for this task.

2017-03-29

Google Search For A Fraud Victim

US judge orders Google to provide information on any internet user found to have searched for one of four variations of a fraud victim’s name.

2017-03-28

Cybersecurity’s Human Side Is A Problem

The challenge in building cybersecurity resilience is that it is not only about software, code and laws but especially about people.

2017-03-28

Security & Encryption After Edward Snowden

Four years after the renegade NSA employee first leaked details of its secret international surveillance activities, Snowden still makes news.

2017-03-27

A Quick Tour Of Cybercrime’s Underground

The evolution of cybercrime has hit a peak with ransomware and Bitcoin. One of the strange features of this is how much of it is in public.

2017-03-24

Flight Ban On Laptops 'sparked by IS threat'

Airplane Mode: Advances in electronics now mean that just about anything with a power source can be turned into an explosive.

2017-03-24

Tomorrow's Smart Cities Will Be Data Driven

Over 70% of the world's population will live in urban areas by 2050 - but don't think that means you will be able to get lost in the crowd.

2017-03-23

Hack Headlines Cause Financial Damage

Many large companies would prefer to pay ransom to avoid public shaming & other devastating consequences of a security breach.

2017-03-22

HSBC Appoints A Technology Advisory Board

The banking giant wants to capitalise on opportunities in AI, biometrics, blockchain and data science, using its global reach to fight cybercrime.

2017-03-22

Healthcare Starts Spending Big On Cybersecurity

Healthcare organisations are increasing information security spending, reflecting a rapid transition to electronic records & data digitisation.

2017-03-22

New Malware Hides In Memory

DNSMessenger: Researchers at the Talos threat research group have published a report on a new form of malware that’s very difficult to detect.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Feitian Technologies

Feitian Technologies

Feitian Technologies provides authentication and transaction security products for financial institutions, telecoms, government and leading business enterprises.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

M12

M12

M12 (formerly Microsoft Ventures) is the corporate venture capital subsidiary of Microsoft.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Query.ai

Query.ai

At Query.AI, we are committed to helping companies unlock the power of their security data, so they are empowered to meet security investigation and response goals while simultaneously reducing costs.

Association of anti Virus Asia Researchers (AVAR)

Association of anti Virus Asia Researchers (AVAR)

AVAR's mission is to prevent the spread of and damage caused by malicious software, and to develop cooperative relationships among anti-malware experts in Asia.

Detego Global

Detego Global

Detego Global are the creators of the Detego® Unified Digital Forensics Platform, a suite of modular tools used globally by military, law enforcement and intelligence agencies, and enterprises.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

AXGATE

AXGATE

AXGATE is a specialized security solutions company based on our distinctive technological capabilities in the field of network information protection.