News

2016-11-09

Smartphone Attachment Can Detect Cancer

A portable sensor that uses a smartphone's camera to detect a biological indicator for several types of cancers with 99% accuracy.

2016-11-09

NATO Cyberwar: Establishing Rules Of Engagement

Counter-measures are operations that would otherwise be unlawful but can be used if the purpose is to stop another state from violating the law.

2016-11-09

Fears Of Hacked US Election Ebb Away

The US government assertions that Russia was destabilising the election and Donald Trump's claim the process was rigged have come to nothing.

2016-11-08

IoT Is A Cyberwar Nightmare

The world got a glimpse of the future when a large-scale cyberattack prevented access to many key websites, exposing big concerns about the IoT.

2016-11-08

International Police Start Crackdown On The Darknet

Law enforcement is staging a worlwide crackdown on DarkNet web sites, targeting merchants & customers of drugs and illicit goods.

2016-11-08

Big Hack At Tesco Bank – Money Vanished

Tesco Bank has halted online payments for current account customers after ‘over £10m’ was taken from 20,000 accounts.

2016-11-04

Is The CIA Ready For Post-Election Chaos?

The campaign to undermine the US presidential election, through hacking, cyberattacks and disinformation will have reached a peak on voting day.

2016-11-04

Healthcare Industry Lacks Basic Security Knowhow

Levels of security awareness in Healthcare are lower than average and this sector is particularly vulnerable to social engineering style attacks.

2016-11-04

New IoT Chips See, Think & Act Autonomously

The new generation of chips powering the Internet of Things have some quite remarkable capabilities.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

2016-11-02

No Need To Shoot Down Drones – Just Hijack Them

It's possible to hijack a wide variety of radio- controlled aircraft and other devices that use a popular wireless transmission technology.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Law Enforcement Cyber Center (LECC)

Law Enforcement Cyber Center (LECC)

LECC is designed to assist police, digital forensic investigators, detectives, and prosecutors who are investigating and preventing crimes that involve technology.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Samoby

Samoby

Samoby provide a subscription solution for Mobile Threat Protection and usage control on Android and iOS devices.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Exterro

Exterro

Exterro is a leading provider of e-discovery and information governance software specifically designed for in-house legal, privacy and IT teams at Global 2000 and Am Law 200 organizations.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

Northrop Grumman

Northrop Grumman

Northrop Grumman is a global provider and integrator of complex, advanced and rapidly adapting information technology, cybersecurity, mobility and optimized services and solutions.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.

Identifly

Identifly

Identifly is the leading Australian independent identity consultancy and partner in Australia, helping enterprises implement large scale identity security projects fast.

Arksentry

Arksentry

ArkSentry is a modern penetration testing platform powered by highly vetted security experts. We make pentests easier, faster, and more affordable with powerful integrations built for today.