News

2021-03-30

Facebook's Internal Content Rules Revealed

Facebook users are allowed to call for the death of public figures and can praise mass murders based on vague definitions of what constitutes a crime.

2021-03-29

Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals advise each other to say and do in case they get caught.

2021-04-01

New Cyber Security Measures To Protect US Energy

The US is launching new research programs to to safeguard the national energy system from the growing threat of cyber and physical hazards.

2021-03-30

NSA Will Hunt Cyber Attackers Inside The US

US Senators will support expanding the scope for the NSA and US Cyber Command to resume conducting intelligence gathering domestically.

2021-03-26

FBI 2020 Online Crime Report

The FBI says that the top three crimes reported by victims in 2020 were phishing scams, non-payment/non-delivery scams and extortion.

2021-03-26

Trump is Planning A Social Media Return

Following a permanent ban on Twitter and Facebook, Donald Trump will launch his own social media platform to express his views.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

2021-03-24

Secure Your Personal Email & Social Media Accounts

Social Media Hacks: Facebook, Instagram and Snapchat were the most reported platforms on which people had their accounts compromised.

2021-03-24

Britain's Cyber Force Toughens Up

The National Cyber Force is being assembled to ‘detect, disrupt and deter’ adversaries as a key part of a new fully-formed British cyber strategy.

2021-03-24

2021 Blockchain Trends

Faster transactions, transparency and the absence of intermediaries, all mean that blockchain will become a dominant technology in many industries.

2021-03-23

The Iran-Russia Cyber Agreement & US Strategy In The Middle East

Cyber cooperation between Moscow and Tehran, while essentially defensive in nature, could pose several challenges to US cyber operations.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

RIVA Solutions

RIVA Solutions

RIVA provides innovative best practices in IT and management consulting, program support services and emerging technologies.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

Cyber, Space, & Intelligence Association (CSIA)

Cyber, Space, & Intelligence Association (CSIA)

CSIA focuses on issues critical to Cyber Security, Military Space and Intelligence.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Forter

Forter

Forter provides new generation fraud prevention to meet the challenges faced by modern enterprise e-commerce.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center

Texas A&M Cybersecurity Center is dedicated to combating adversaries who desire to harm our citizens, our government, and our industry through cyber-attacks.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Mitnick Security

Mitnick Security

Mitnick Security is a leading global provider of information security consulting and training services.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

Pulsar Security

Pulsar Security

Pulsar Security is a team of highly skilled, offensive cybersecurity professionals with the industry's most esteemed credentials and advanced real-world experience.