News

2016-04-11

Is Breach Notification Part Of Your Response Plan?

Is customer-facing breach notification and response a part of your incident response plan? It should be!

2016-04-07

Typo Thwarts Hackers In $1B Cyber Heist

It was just a few letters off: Someone misspelled “foundation” as “fandation” on an online payment transfer request for $1 billion .

2016-04-08

Cybersecurity Budgets Rise But Not In Line With Threats

The Institute of Information Security Professionals (IISP) has announced the findings from its 2016 member survey.

2016-04-08

BYOD Security Report

Crowd Research Partners' new report provides a conflicting picture of current BYOD security barriers and adoption trends in the workplace.

2016-04-06

The Top 4 IT Risks For Small Businesses

Most small businesses assume that the bigger enterprises are more under cyber threat. This assumption is not right.

2016-04-08

CISO Cyber Communications Breakdown

CISOs and the board of directors are missing the mark when it comes to cybersecurity reporting.

2016-04-05

Russian Cyber War Training Can Be A Killer

Russia is developing and testing military grade Cyber War weapons on real targets, and finding out what works and what needs improvement.

2016-04-06

CEOs Seek Out CIOs With A 'Bias For Action'

CIOs are bracing for the harsh winds of change inherent in business transformations and are asking what it is CEOs want from today's IT leaders.

2016-04-06

Thought Experiment: Predicting Cyber War

There are no historical models for full scale Cyber War - what would it be like and how might it be to conducted?

2016-04-05

Anonymous To Launch Cyberattacks Against Trump

The Anonymous hacktivist collective has announced plans to disrupt Donald Trump’s presidential campaign.

2016-04-05

Cognitive Computing Market Forecast To Be Worth $31Billion In 3 Years

Cognitive computing will drive digital transformation and show explosive growth over the next few years.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Lares Consulting

Lares Consulting

Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing and coaching.

Open Systems International (OSI)

Open Systems International (OSI)

Our innovative Operations Technology (OT) solutions are highly scalable and can be deployed by various utility companies to monitor, control and optimize their real-time operations.

Sysorex Government Services

Sysorex Government Services

Sysorex Government Services helps customers meet their strategic missions by providing secure, optimized IT solutions that allow them to perform more efficiently and effectively.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

ABPSecurite

ABPSecurite

ABPSecurite is a leading value-added distributor and a network performance solutions provider.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.