News

2017-04-25

The New Face of Cybersecurity

Phishing, spear-phishing, whaling, ransomware, hacking, hacktivism, corporate espionage. Attacks are becoming more insidious and sophisticated.

2017-04-25

UK Airports & Nuclear Power Stations On Cybersecurity Alert

UK security services have issued a series of alerts warning that terrorists may have developed ways of bypassing safety checks.

2017-04-25

Google’s Fact Checking News

Google follows Facebook and is to start displaying fact-checking labels in its search results in an attempt to combat fake news.

2017-04-24

A Geneva Convention For Cyber War

Unlike conventional conflict, there are no rules of play for cyber attacks. Is it time countries started talking about this nascent form of warfare?

2017-04-24

Targeted Ransomware Attacks Are Focusing On Business

Cyber criminals are increasingly turning their attention from attacks against private users to targeted ransomware attacks against businesses.

2017-04-24

Luxembourg: A Prime Target For Cyber Attack

Who is it that is trying to hack Luxembourg's government and businesses and what are they looking for?

2017-04-24

Cybercrime Cost The Global Economy $450Billion In 2016

Hiscox Insurance chief says there is an epidemic of cybercrime costing billions. Yet, 53% of US, UK and German businesses are unprepared.

2017-04-21

The Dark Web: What It Is And How It Works

It's not just about drugs, guns & porn. In the enormous hidden Web one person’s criminal paradise is another’s freedom fighting resource.

2017-04-21

The Next Big Conflict Will Turn On Artificial Intelligence

Whoever collects the most data on Day One just might win the next war before a even single shot is fired.

2017-04-21

Cyber Attacks Against Korean Missile Launches

The North Korean government appears to be marching toward its goal of nuclear weapons, slowly or otherwise.

2017-04-19

FBI’s International Framework On Encrypted Data Access

The FBI wants an international agreement between governments to ease fears about IT products with government-mandated backdoors.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Zscaler

Zscaler

Zscaler enables the world’s leading organizations to securely transform their networks and applications for a mobile and cloud first world.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Efecte

Efecte

Efecte is a Nordic SaaS company specialized in IT Service Management, Self-Service, Identity Management and Access Governance solutions.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Private Internet Access

Private Internet Access

Private Internet Access is a Virtual Private Network services provider offering secure encrypted access to the internet.

TorGuard

TorGuard

TorGuard is a Virtual Private Network services provider offering secure encrypted access to the internet.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Greenwave Systems

Greenwave Systems

Greenwave's AXON Platform enables IoT and M2M network service providers to address security, interoperability, flexibility and scalability from a single IoT platform.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ITonlinelearning

ITonlinelearning

ITonlinelearning specialises in providing professional certification courses to help aspiring and seasoned IT professionals develop their careers.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Componolit

Componolit

Componolit GmbH is a highly specialized company with a strong emphasis on trustworthy software, component-based systems and formal verification.

Foundries.io

Foundries.io

Foundries.io have built a secure, open source platform for the world's connected devices, and a cloud service to configure this to any hardware and any cloud.

StrongBox IT

StrongBox IT

Strongbox IT provides solutions to secure web applications and infrastructure.