News

2019-02-27

Three Ways the Pentagon Could Improve Cyber Intelligence

The US military needs to expand its cyber intelligence capabilities to meet the Trump administration’s new cybersecurity strategy.

2019-02-26

DARPA To Test Infrastructure Resilience

Cyber-attacks pose a challenge for US infrastructure security and DARPA have set up a joint exercise to test resistance to multiple threats.

2019-02-25

Lack Of Tech Expertise At Board Level Puts Strategy At Risk

Boards lack the expertise to fully understand the challenges and opportunities that data and technology present to their organisations.

2019-02-25

Hidden Truth About Cyber-Crime: Insider Threats

Malware is not the main cause of data loss. In fact, phishing, privilege breaches and compromised passwords are far more prevalent.

2019-02-20

Obsessive Web Browsing Linked To Depression

A large-scale academic study discovers a link between spending a lot of time browsing the Internet and depressive symptoms.

2019-02-22

Will Blockchain Change the World?

There have been many claims about the potential of Blockchain. Here are some basic concepts to help understand what it is and where it is going.

2019-02-22

The US Pentagon Is Speeding-Up Its Cloud Strategy

The US Defense Department has released its new cloud strategy, laying out the pathway for military adoption of cloud technology.

2019-02-19

Russia May Disconnect From The Internet

Russia wants the capability to isolate its own internet from the rest of the world and is testing the ways to insulate its networks from external access.

2019-02-18

China Accused Of A Cyber-Attack On Australia's Parliament

Australia's security agencies are investigating a breach of their Parliament's computer network suspected to be a foreign government attack.

2019-02-18

Cyberwar Vs. Traditional Conflict

The first difference between cyberwar and traditional warfare is in knowing who exactly attacked you. The second is in knowing when.

2019-02-18

Chinese Hackers Go After Norwegian Businesses

Chinese hackers APT10 have stolen data from a Norwegian cloud software security company, according to experts at Recorded Future & Rapid7.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

GE Digital

GE Digital

GE Digital is a leading software company for the Industrial Internet. Products include Industrial Cyber Security for Operational Technology (OT).

SCADAfence

SCADAfence

SCADAfence offers cutting edge cybersecurity solutions designed to ensure the operational continuity of industrial (ICS/SCADA) networks.

Xcina Consulting (XCL)

Xcina Consulting (XCL)

Xcina Consulting provides high quality business and technology risk assurance and advisory services.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

Assac Networks

Assac Networks

Assac Networks ShieldIT is an app that completely protects any BYOD smartphone from both tapping and hacking.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

DCX Technology

DCX Technology

Recognized as a leader in security services, DXC Technology help clients prevent potential attack pathways, reduce cyber risk and improve threat detection and incident response.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Quside

Quside

Quside, a spin-off from The Institute of Photonic Sciences in Barcelona, designs and manufactures innovative quantum technologies for a wide range of applications including cyber security.

Perygee

Perygee

Perygee is a fully integrated platform for operational security. Companies depend on Perygee to identify and streamline the most important security practices for their operations.

Electrosoft Services

Electrosoft Services

Electrosoft provide mature, innovative technology-based services and solutions to power critical IT programs and keep our nation safe from cybersecurity attacks.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

GoodAccess

GoodAccess

GoodAccess is the cybersecurity platform that gives your business the security benefits of zero trust without the complexities so your users can securely access digital resources anytime, anywhere.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.