News

2016-05-24

Google Hiring People To Test Self-Driving Cars

Help Wanted: Strong nerves and the ability to give concise engineering feedback required.

2016-05-19

China Denounces Pentagon Cyberwarfare Report

China does not like a new new US Defense Department report that puts a spotlight on cyberwarfare.

2016-05-18

Britain’s Border Control Systems Keep Falling Over

The system that provides a critical additional layer of security by screening all passengers against lists of suspected individuals is not reliable.

2016-05-19

Anonymous Declares War On Global Banks

Operation Icarus: The hacking collective Anonymous has launched a thirty-day campaign against global banks..

2016-05-18

Russian Hackers Try To Attack German Governing Party.

Pawn Storm hackers appear to be trying to steal personal and corporate data from the governing CDU party and other high-profile individuals.

2016-05-16

Think You Know Your Customers? Try Authenticating Them

Customer demands are increasing and changing rapidly, forcing companies to adopt new technologies that scale with their business security needs.

2016-05-18

International Co-Operation: Challenges & Potential For Engaging In Cyberspace

International norms in cyber security are headed into a period of turbulence. Opinion by Jamie Collier

2016-05-17

Syrian Government Hacked

Mystery group named Cyber Justice Team hacked the Syrian National Agency for Network Services and dumped the stolen data.

2016-05-18

Ransomware Everywhere: What’s The Technology Behind It?

According to the FBI, US companies paid $25 million in ransom last year, and it expects the 2016 total to be more than $200 million.

2016-05-18

Hacking Team Postmortem

Hacking Team sells intrusion and surveillance tools to governments and law enforcement agencies. Nine months ago they were hacked.

2016-05-24

As Pentagon Dawdles, Silicon Valley Sells It’s Hottest Technology Abroad

Technolgy CEOs say red tape and onerous requirements are undermining just the sorts of products that the Pentagon says it wants.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

Greensafe IT

Greensafe IT

Greensafe offer various onsite and offsite data erasure services, aimed at increasing data security whilst reducing any risk of data loss during transit.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

AppSentinels

AppSentinels

Appsentinels are a group of security and technology experts with a mission to fix gaps in application security.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.

Federal Office for the Protection of the Constitution (BfV)- Germany

Federal Office for the Protection of the Constitution (BfV)- Germany

The Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz - BfV) is the domestic intelligence services of the federal government of Germany.

Reclaim Security

Reclaim Security

Reclaim Security is your always-on force multiplier, empowering security teams to eliminate threat exposure using your existing security stack.