News

2022-02-04

Is US Cyber Security Actually Improving?

The US Government is mandating Federal Agencies to move to a 'ZeroTrust' approach to cyber security and implement multilayer user authentication.

2022-02-04

Cyber Criminals Frustrated By Russian Crypto Currency Rules

How To Spend It: New restrictions on using crypto currencies are making life more difficult for Russia's prolific ransomware specialists.

2022-02-02

Google Sued over 'Deceptive' Location Tracking

Dark Patterns: Consumers who use Google products cannot prevent Google from collecting, storing and profiting from their location data.

2022-02-02

Winner: NSA Best Cyber Security Research Paper

The US spy agency runs an annual competition to find the best cyber security scientific research. This year's winner is all about cryptography.

2022-02-02

North Korea's Internet Is Faltering

Nationwide Shutdown: Domain names ending in ".kp," which includes all websites for North Korea's state-run media outlets have begun to fall over.

2022-02-01

Britain's Cyber Security Strategy Focuses On Resilience

The British government has announced its Cyber Security Strategy to protect vital public services from the growing risk of destructive cyber attacks.

2022-02-01

‘Honey Trap’ Sites Recruiting Israeli Spies

False Flags & Fake Dating Sites: There is a poliferation of websites offering well paid jobs and romantic fulfillment in an escalating online conflict.

2022-02-01

Ransomware Attack On French Ministry of Justice

It is a mistake to think that national goverenment agencies are more skilled at protecting their critical data than the private sector.

2022-02-01

Academic Institutions At Risk Of Cyber Attacks

A combination of confidential data, commercially desirable research plus a culture of openness, makes Colleges & Universities prime targets.

2022-01-31

Artificial Intelligence Is Increasingly Important In Cyber Security 

Force Multiplier: AI offers major advantages for protecting people, systems & organisations from the relentlessly growing range of cyber threats.

2022-01-31

Millions Of IoT Devices At Risk To Malware

Source code of previously unknown malware named BotenaGo has been made widely available via GitHub, threatening millions of exposed IoT devices.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Arm

Arm

Arm technology is building the future of computing. We architect, develop, and license high-performance, low-cost, and energy-efficient IP solutions for CPUs, GPUs, NPUs and interconnect technologies.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Avertium

Avertium

Avertium is the managed security and consulting provider that companies turn to when they want more than check-the-box cybersecurity.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Lattice Semiconductor

Lattice Semiconductor

Lattice Semiconductor solves customer problems across the network, from the Edge to the Cloud, in the growing communications, computing, industrial, automotive and consumer markets.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Data Priva

Data Priva

Data Priva is the UK's leading subscription-based data protection, governance, risk and and compliance service.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.