News

2018-01-02

UK Spy Agency GCHQ Is Losing Cyber Talent

In its annual report GCHQ admits problems with keeping its top cyber talent who are being hired away to tech companies offering much higher pay.

2018-01-02

Social Media Is 'Ripping Society Apart'

The growing band of critics who blame social media for a wide range of cultural, political & humanitarian ills includes a senior ex-facebook executive.

2018-01-02

GDPR - Its Complicated.

Old software, weak access controls and a poor data security culture all weaken your position under GDPR. Improvement is going to be mandatory.

2018-01-02

When Terrorists Learn How to Hack

Terrorist groups are expanding their use of the Internet beyond disseminating operational know-how. They are building threatening new hacking tools.

2018-01-02

Snowden’s Haven - A New Surveillance App

A new career in the security business for Edward Snowden as the famed NSA whistleblower reinvents himself as a tech entrepreneur.

2017-12-29

Chinese Hacker Groups Shift Focus To India

Experts at FireEye say they expect to see Chinese APT groups focusing more attacks on India in 2018.

2017-12-29

Intelligent & Autonomous Security Robots

A new artificial intelligence technology that gives security guard robots the ability to communicate & deploy jointly at the same patrol site.

2017-12-28

Iranian Hackers Have Infiltrated US Infrastructure

Iranian hacking group APT34 appear to have burrowed deep, targeting US financial, energy, telecommunications and chemicals companies.

2017-12-27

Popular Streaming Sites Secretly Mine Cryptocurrency

Several popular streaming sites are raking in huge sums of money while visitors are busy viewing or converting videos.

2017-12-27

Very Few Women Are CISOs

A good CISO is hard to find especially in the case of female executives, who hold only 13% of these vital roles in top companies.

2017-12-22

US Defense Contractors Stole Images From UK Secret Surveillance Station

In a major embarrassment to US & UK military authorities, architects disclosed top secret images of the RAF Croughton SIGINT interception centre.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

Eseye

Eseye

Eseye is a global specialist supplier of cellular internet connectivity for intelligent IoT (Internet of Things) devices.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

Salem Cyber

Salem Cyber

Salem Cyber builds Artificial Intelligence (AI) solutions that work collaboratively with people to address scalability challenges in cybersecurity operations.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.