News

2017-05-05

US vs. North Korea Cyberwar Underway

It seems highly likely that an innovative and highly secretive cyber war is underway with implications for critical infrastructure.

2017-05-03

Cyber Should Be Standalone Insurance

Treating cyber risk as a standalone insurance risk promises to unlock the potential for meaningful coverage for both insurers & buyers.

2017-05-03

Intelligence Agency Backs Start-Up Spy Apps

The US Defense Intelligence Agency has a new approach to acquisition and software development that looks a lot like Silicon Valley's.

2017-05-03

Google Acts Against Fake News

Google announces its first attempt to combat the circulation of “fake news” on its search engine using new tools.

2017-05-02

Cybersecurity Trends For Boards & Directors

Directors find themselves in unfamiliar territory when it comes to formulating policies & oversight processes that address cybersecurity risk.

2017-05-02

Technology Can Not Diminish Insider Threats By Itself

The key to reducing insider threats lies in understanding the individual’s mindset and having robust monitoring on that person's systems & data.

2017-05-02

Ten Myths About Cybercrime

Don't let cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organisation from attack.

2017-05-02

Snowden Can Stay In Russia For As Long As He Likes

The former NSA contractor has been living in Russia since 2013, after leaking thousands of classified intelligence documents and fleeing the US.

2017-05-02

EU / US Privacy Shield Affects Your Organisation

Although we live in a world where data transfer is easier from a technical standpoint, location is increasingly important from a legal perspective.

2017-05-01

Teenagers And Cybercrime

More teenagers are getting involved in cybercrime. Many do it for fun without realising the consequences, but the penalties can be severe.

2017-05-01

Get Ready: Robots Will Destroy Jobs

Robotics promises to be the most profoundly disruptive technological shift since the industrial revolution.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Fullstack Academy

Fullstack Academy

A trailblazer in bootcamp education, Fullstack Academy prepares students for fulfilling careers in tech through our NYC campus, online learning, and university partnerships.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

CyberForceHQ

CyberForceHQ

CyberForce helps cyber security professionals take real-world tests, get ranked and get paid better. It's that simple.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.