For continued FREE access to Articles and Directory Listings please Login to your Account or Sign Up.

Subscribe Login

2020-08-03

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Understanding adversary tactics & techniques based on real-world observations are critical to building effective threat detection capabilities.

2020-08-11

Which Industries Suffer Most From Remote Working?

Cybercrime threat rates by sector since lockdown vary significanty and some sectors have experienced a big increases in their threat levels.

2020-08-11

Six Reasons To Move Your SIEM To The Cloud

There are important differences between cloud and on-premises SIEM and moving to the cloud has several advantages. By Gilad David Maayan.

2020-08-11

Breaking Up Big Tech

America’s major tech platforms are using their market-share to entrench their dominance and insulate themselves from the threat of competition.

2020-08-10

Cyber Security Intelligence Directory - 5,000 Supplier Database

Our Directory now exceeds five thousand providers of cyber security products and services across specialist categories worldwide.

2020-08-10

Cyber Security Teams Worry Most About Phishing & Ransomware

Inundated with too many alerts, Cyber Security teams are struggling with a lack of visibility into threats, endpoint devices and access privileges.

2020-08-10

The Effects Of GDPR On EU / US Relations

The attempt by GDPR to extend EU privacy rights to every country receiving EU personal data suggests that privacy standards will be globalised.

2020-08-10

Using Artificial Intelligence In Academic Research

The right AI powered tools and techniques can make a significant difference in how research is conducted and how fast results are obtained.

2020-08-10

Securing The Remote Workforce Is A Top Priority

The emergence of the worldwide coronavirus pandemic has pushed remote work to the top of the priority list for business. By Aaron Swain.

2020-08-07

What Is A Cyber Security Audit?

A security audit is a critical component of modern business and its key purpose is to assist in developing a strategy for managing cyber security.

Subscribe!

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Thursday August 27, 2020: Join SANS and AWS Marketplace to learn how you can leverage solutions to create visibility at scale and allow you to do more with your data and improve your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

infineon - IoT Security

infineon - IoT Security

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

Axiomatics

Axiomatics

Axiomatics provides dynamic authorization and access control solutions to protect critical data assets.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Segment

Segment

Segment provides a range of services and solutions for all companies which have a need for data protection and IT security.

Dreamlab Technologies

Dreamlab Technologies

Dreamlab specialises in securing critical IT infrastructures. We offer qualitative support and advice for managing your infrastructure and cyber security needs.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Blockchain Firm

Blockchain Firm

Blockchain Firm is a leading Blockchain based software solutions and service provider with our roots of expertise running deep into the technology.

Bolt Learning

Bolt Learning

Bolt's Cyber Security eLearning module provides users with an in-depth understanding of cybercrime, how it can occur and what everyone can contribute to preventing it.