News & Events

Stay informed of industry news and events by subscribing to our RSS feed, or access our resource centre to view industry whitepapers, datasheets and webcasts.


CYFOR launches vulnerability assessment services

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Today we have launched a unique service to help businesses avoid hackers or disgruntled employees exploiting their vulnerabilities. With high profile hacking reported daily including recent cases of Sony and SOCA, companies face serious risk by not protecting their IT environment.  Joel Tobias, our Managing Director, commented “It’s a cliché, but prevention is better than …Read More

28th June 2011 | Posted in Cyber Security, News & Events by


Is anyone safe from hackers?

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

It seems as if no one is safe these days. Major names in the industry, whose security might otherwise have been expected to be the best, have found that their systems have been compromised and that they are far more vulnerable than they thought. Sony, Nintendo, SOCA, the NHS and others have fallen foul to …Read More

23rd June 2011 | Posted in Cyber Security, News & Events by


Recent developments in computer forensic analysis

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

As mentioned in my blog yesterday, of which this is part 2, the following is taken from a presentation that one of our forensic investigators gave at a recent Fraud Advisory Panel conference….. Traditionally, forensic investigations are conducted on a forensic copy or ‘image’ of an item of media which was captured using the methodology …Read More

10th June 2011 | Posted in Computer Forensics, Digital Forensics, Forensic Imaging by


Computer aided fraud detection and investigation tools

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

One of our forensic investigators recently presented at the Fraud Advisory Panel conference….the presentation was very well received so I thought I’d share it with you – part 1 today and part 2 tomorrow. Fraud has much in common with many other crimes.  Standard computer forensic tools are suitable, in most cases, for finding evidence …Read More

9th June 2011 | Posted in Computer Forensics, Digital Forensics, Events, Forensic Imaging, Fraud, Past Events by


CYFOR Secure

SHARE VIA: Tweet about this on TwitterShare on LinkedInShare on FacebookGoogle+

Risk management should be an integral part of an organisation’s information security policy to protect the confidentiality of their corporate information, disruption to services and lost business costs.  The process of risk management is an ongoing iterative process as the business environment is constantly changing with new threats and vulnerabilities emerging every day. CYFOR supports …Read More

9th June 2011 | Posted in Uncategorized by




RSS The Register

  • Sony phone chief vows to keep losing money forever and ever 07th July 2015
    CEO may be less enthusiastic about staying in market until extinction of competitors Sony's phone boss has vowed to stay in the mobile business until the heat death of the universe – despite losses that have dragged the rest of the Japanese giant down.…
  • EMC sells Syncplicity sync'n'share biz to Skyview Capital. Told ya! 07th July 2015
    It's all about core products – and not giving VMware internal competition EMC has divested its Syncplicity Dropbox clone enterprise file sync and share, which has been scooped up by private investment outfit Skyview Capital - confirming the rumours El Reg brought to you earlier today.…
  • Private companies fall behind in cloud spending race 07th July 2015
    Public cloud splurges cash, trad IT spend to slip Spending on cloud infrastructure will take an increasing share of customer dollars over the next five years, with public cloud providers outspending their private cloud counterparts.…