News

2019-03-07

What Is Data Fusion?

Big Data is all around us, in every field of life. But in spite of the far-reaching advantages, obvious clues frequently hide in a sea of unrelated data.

2019-03-06

Cyber Security Pros Are Feeling The Pressure

A major study carried out by Nominet reveals the heavy workload and budgetary problems that are having a physical effect on cybersecurity leaders.

2019-03-06

Blockchain’s Newest Application Is Civil Aviation

Blockchain networks and smart contracts can help mitigate some of the most difficult security issues in the aviation industry.

2019-03-06

Cyber Command’s Plan to ‘frustrate’ Hackers Is Working

Defend Forward: US cyber soldiers have found ways to let foreign nation-state hackers know they are being watched and can be intercepted.

2019-03-05

Four Ways That Fake-News Sites Trick People

Fake-news sites are successful because many people believe and then share their false reports. How can social media users avoid being misled?

2019-02-20

Take An Analytical Approach To Cybersecurity Training

There are many solutions designed to protect businesses from just about any security threat, yet an enterprise's biggest weakness is its people.

2019-03-05

Dating Sites Fraudster Alert

Romance fraudsters target lonely hearts using dating sites. Not only will they steal your heart, they will steal your money and your identification.

2019-02-20

Russian Hacking Intensifies Closer To Ukrainian Election

Russian hackers are redoubling their efforts in the run-up to presidential elections in Ukraine, according to the head of Ukraine’s cyber-police.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-03-05

Edward Snowden Likes Zcash

Unbothered by the repressive regime where he lives in Moscow, Edward Snowden has expressed support for a controversial new cryptocurrency.

2019-03-04

The US Military Has A Free Rein For Offensive Hacking

The Trump administration made it easier for the US military to conduct offensive cyber operations. But this new authority should be used carefully.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

SecuTech Solutions

SecuTech Solutions

SecuTech is a global leader in providing strong authentication and software licensing management solutions.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Pelion IoT

Pelion IoT

Pelion Connected Device Services are the easiest way to securely connect and manage your devices, allowing you to focus on forging your future.

Red Sky Alliance

Red Sky Alliance

Red Sky Alliance (Wapack Labs Corp) is a cyber threat intelligence firm that delivers proprietary intelligence data, analysis and in-depth strategic reporting.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Ebryx

Ebryx

At Ebryx, we are at the forefront of cybersecurity innovation, leveraging over a decade of expertise to protect and empower organizations worldwide.

Hurricane Labs

Hurricane Labs

Hurricane Labs is a managed security services provider (MSSP) that focuses on Splunk.