News

2019-02-27

Three Ways the Pentagon Could Improve Cyber Intelligence

The US military needs to expand its cyber intelligence capabilities to meet the Trump administration’s new cybersecurity strategy.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

2019-02-25

Lack Of Tech Expertise At Board Level Puts Strategy At Risk

Boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organisations.

2019-02-25

Hidden Truth About Cyber-Crime: Insider Threats

Malware is not the main cause of data loss. In fact, phishing, privilege breaches and compromised passwords are far more prevalent.

2019-02-20

Obsessive Web Browsing Linked To Depression

A large-scale academic study discovers a link between spending a lot of time browsing the Internet and depressive symptoms.

2019-02-22

Will Blockchain Change the World?

There have been many claims about the potential of Blockchain. Here are some basic concepts to help understand what it is and where it is going.

2019-02-22

The US Pentagon Is Speeding-Up Its Cloud Strategy

The US Defense Department has released its new cloud strategy, laying out the pathway for military adoption of cloud technology.

2019-02-19

Russia May Disconnect From The Internet

Russia wants the capability to isolate its own internet from the rest of the world and is testing the ways to insulate its networks from external access.

2019-02-18

China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a breach of their Parliament's computer network suspected to be a foreign government attack.

2019-02-18

Cyberwar Vs. Traditional Conflict

The first difference between cyberwar and traditional warfare is in knowing who exactly attacked you. The second is in knowing when.

2019-02-18

Chinese Hackers Go After Norwegian Businesses

Chinese hackers APT10 have stolen data from a Norwegian cloud software security company, according to experts at Recorded Future & Rapid7.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Cyber Physical Security Research Center (CPSEC)

Cyber Physical Security Research Center (CPSEC)

CPSEC aims to contribute to the security enhancement of industrial infrastructure that creates value across cyber space and physical space.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

TrueFort

TrueFort

TrueFort take an application-first approach that offers comprehensive protection for real-time visibility and analysis, protection and better communication across business, IT, and security teams.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Comcast Business

Comcast Business

Comcast Business keeps businesses ready for what’s next with powerful connectivity, advanced cybersecurity solutions, and the right people at your side.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

Krista Software

Krista Software

Krista is an intelligent automation platform that combines iPaaS and Conversational AI to automate complete business processes across your teams and apps.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.