News

2015-11-25

US Intelligence Faces A Diversity of Challenges

From nation-states to individuals acting on behalf of terrorist groups, the US intelligence community has big challenges preventing attacks.

2015-11-25

Cyber Warfare Specialists NSO Group Explore $1Billion Sale

Secretive maker of spyware is about to cash out with a major trade sale.

2015-11-25

Is AI a Threat to Media Jobs?

DeepMind want to 'solve intelligence'. It's about the science of making machines smart.

2015-11-30

Watch Out for the Computer Takeover Scam

A new-style telephone scam where fraudsters impersonate major organisations to take over computers and steal money.

2015-11-25

UK & US Banks Prepare For Cyber Attack Stress Test

Stress Test: Finance centres in London and New York are being hit with simulated cyber attacks this month.

2015-11-30

Can Cyber Intelligence Help Policing Defeat Terrorism?

Opinion by Gavin Thomas, Vice president, British Police Superintendents Association

2015-11-30

Tackling Crime On The Dark Web

GCHQ and the National Crime Agency (NCA) in the UK have formed a new unit with which to police the Dark Web.

2015-11-24

Signal: The Snowden-Approved Crypto App Comes to Android

Open Whisper Systems’ encryption tools already have a wide footprint: Their messaging App Signal, used by Edward Snowden, is now available on Android.

2015-11-24

ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

Islamic State has reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online.

2015-11-30

Entrepreneur’s Guide To Surviving A Tech Bubble

Venture Capital money is chasing the next tech Unicorn. As cyber security is the hot startup sector it's time to ask a few questions.

2015-11-23

Phony War: US Military To Carry Out Pretend Cyber War Against China & Russia

US lawmakers want to project more power in the newest military domain.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Blue Frost Security

Blue Frost Security

Blue Frost Security provides high-level IT security consulting, penetration testing services, ISO 27001 Solutions, PCI compliance solutions and training.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

Cristie Data

Cristie Data

Cristie have been a trusted, innovative and leading edge data storage, backup and virtualisation solutions provider across all sectors of industry for over 40 years.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

WetStone Technologies

WetStone Technologies

WetStone develops software solutions that support investigators and analysts engaged in eCrime Investigation, eForensics and incident response activities.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

Council of Europe Convention on Cybercrime

Council of Europe Convention on Cybercrime

The Council of Europe helps to protect societies worldwide from the threat of cybercrime through the Convention on Cybercrime.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

Secureframe

Secureframe

Companies from startups to enterprises use Secureframe to automate SOC 2 and ISO 27001 compliance, complete audits, and continuously monitor their security.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.