News

2015-12-09

Digital Entrepreneurship

The European Commission wants to stimulate the smart use of digital technologies to create new businesses.

2015-12-08

Hackers Can Use Holes In The Internet of Things

Vulnerabilities in IOT devices such as fitness bands, smart-watches, drones and connected appliances could all be exploited by Hackers

2015-12-08

How to Spot a Fake LinkedIn Profile in 60 Seconds.

The LinkedIn social media platform is an important professional tool. It is also rife with fraud and deceit.

2015-12-09

The Current Chinese Cybercriminal Underground

Trend Micro analyses the cybercrime economy in China and finds it sophisticated and thriving more than ever.

2015-12-07

Insurance & Cyber Vulnerability - Get Your Report for 2016

Recently the growing tide of cyber attacks has begun to spawn a new awareness of the current cyber risks to business.

2015-12-07

Organisations Lack Maturity in Monitoring

Organizations need to dedicate more resources to logging and monitoring to combat the threat of cybersecurity incidents, CREST has warned in a new report.

2015-12-07

Combat the Insider Cyber Threat

The Insider Threat Report uncovers the hard facts on insider threats and what cybersecurity professionals are doing to prevent, detect, and remediate these threats.

2015-12-07

Cyber Threats Create Business Opportunities

Cyber attacks represent a real risk to the functioning of the information society.

2015-12-07

Enterprises Don’t Have Big Data - They Have Bad Data

PayPal co-founder and venture capitalist Peter Thiel commonly harps on the tech community for overusing buzzwords like “cloud” and “big data.”

2015-12-07

Common Cyber Threats You Need to Be Aware Of

Whether you’re a small, medium-sized or large business, it’s time to face facts: your organization will be breached.

2015-12-07

Five Greatest Cybersecurity Myths

With the average cost of a data breach now sitting around $6.5 million in the US, businesses will be eagerly looking at how they can avoid being compromised. With more interest in the industry than ever, we bust the top five myths surrounding cybersecurity

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

LRQA

LRQA

LRQA is an award-winning global provider of cybersecurity services, bringing innovative thought leadership to the ever-evolving cybersecurity marketplace.

360 Total Security

360 Total Security

360 company is the largest provider of Internet and mobile security products in China.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

ActiveFence

ActiveFence

ActiveFence enables Trust & Safety teams to be proactive about online integrity so they can keep their users safe from online harm – across content formats, languages, and abuse areas.

Cyber Octet

Cyber Octet

Cyber Octet is an IT Solution, Security, Training and Services company. We provide training and services from Web Application Security to ISO 27001 implementation.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

AI Security Institute (AISI)

AI Security Institute (AISI)

The AI Security Institute’s mission is to minimise surprise to the UK and humanity from rapid and unexpected advances in AI.

Lightpoint Global

Lightpoint Global

Lightpoint Global is a bespoke software development company. We also provide a spectrum of services such as IT consulting, business analysis, QA and testing, and DevOps services.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.

InstaSecure

InstaSecure

InstaSecure’s Preventive Cloud Controls accelerate alert remediation and strengthen cloud configurations. Set your controls once and prevent current and future risks.

Seasia Infotech

Seasia Infotech

Seasia Infotech is a leader in offering efficient, tailor-made and comprehensive digital transformation services.

Patero

Patero

Patero provides cybersecurity technology solutions that make your data indecipherable with quantum-safe encryption.