News

2016-07-19

UK National Crime Agency: Criminals Winning 'Cyber Arms Race'

Businesses and law enforcement agencies are losing the "cyber arms race" with online criminals.

2016-07-19

UK IP Bill Will Allow Government To Spy On Journalists

The Investigatory Powers Bill will allow the UK Intelligence services and Police to monitor and access journalist Internet, phone & data records.

2016-07-17

US and EU Implement Privacy Shield

EU promises its citizens to restore trust when their personal information is transferred to the US by multinational companies.

2016-07-18

British Royal Navy Drone Ships Will Replace Sailors

Unmanned vessels will become central to efforts in minesweeping and anti-terror missions & will eventually replace most manned ships.

2016-07-17

Dallas Shooting: US Police Robot Kills Suspect

Police’s lethal use of a bomb-disposal robot worries legal experts who say it creates gray area in use of deadly force by law enforcement.

2016-07-18

Turkish Coup: Attempt To Block Internet Fails.

Attempts at blocking or slowing access to social media networks amid an attempted military coup in Turkey have not succeeded.

2016-07-15

Experts Warn of Malicious Brexit Spam

Security experts see an increase in Brexit-themed spam designed to trick recipients into downloading malware.

2016-07-13

Ukrainian Hacker Pleads Guilty to US Insider Trading Charges

A Ukrainian man has pleaded guilty to his role in an insider trading scheme that netted more than $30 million (£20.8 million) in illicit profits.

2016-07-14

Threat Intelligence Sharing Deals With Cybersecurity

Access to timely information and intelligence is vital in protecting organizations and firms against data breaches & security incidents.

2016-07-15

The Nation State Hack-Attack

Cyber-security is not all about cyber-thieves. It is about cyber-spies too.

2016-07-15

Infrastructure Security in the Age of Ransomware

Critical infrastructure including electric and water utilities are being temporarily shut down as ransomware plagues corporate systems.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions is the manufacturer of the mobile device management solution Cortado MDM.

HID Global

HID Global

HID Global is a trusted leader in products, services and solutions related to the creation, management, and use of secure identities.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

DG Technology

DG Technology

DG Technology is a customer-centric technology expert and business consultant that delivers services and products to minimize your information security, compliance, and business risks.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Jeffer Mangels Butler & Mitchell LLP (JMBM)

Jeffer Mangels Butler & Mitchell LLP (JMBM)

JMBM is a full service law firm providing counseling and litigation services in a wide range of areas including cyber security.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

IoTeX

IoTeX

Building the connected world. IoTeX is a fast, secure, and decentralized platform that connects real world devices/data to the blockchain.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

Concentrix

Concentrix

Concentrix - the intelligent transformation partner. We help the world’s leading organisations to modernise technology, transform experiences, and solve their toughest business challenges.