News

2021-10-15

British Police IT Systems Cannot Cope With Cyber Crime

Barely 3% of cyber crimes come to the attention of Britain's police forces, whose computer & IT systems are often old and obsolete.

2021-10-15

Ukraine Police Arrest Botnet Attack Controller

Arrested: A suspected botnet operator responsible for controlling an automated network of 100,000 compromised machines to launch DDoS attacks. 

2021-10-14

Russia's Criminal Hackers

Ransomware exploits are dominated by Russian-speaking cyber criminals who are shielded & sometimes employed by their own goverenment.

2021-10-13

Ever Increasing Attacks On Maritime Ports & Systems

Attacks on the maritime industry’s systems have increased by 900% in the last three years with reported incidents set to reach record volumes. 

2021-10-13

The Many Dangers Of WFH

70% of remote workers have experienced IT problems during the pandemic and 54% had to wait up to three hours for the issue to be resolved.

2021-10-13

Russian Cyber Security Chief Charged

Treason: lya Sachkov, founder and CEO of Group-IB has been charged with divulging state secrets to foreign intelligence agencies.

2021-10-12

How To Use Transit Gateways To Monitor Traffic

Transit gateways are a way of managing traffic via different Virtual Private Clouds and AWS accounts, making them much easier to use. By Emily Henry

2021-10-12

Google’s DeepMind Faces Legal Action Over Data Misuse

DeepMind admits that it concentrated on building tools for clinicians, rather than thinking about protecting the privacy and other needs of patients.

2021-10-13

Don't Click On Pop-Ups

Dark Patterns are website design methods intended to collect more information and extract more cash than users intend by exploiting cookies.

2021-10-11

Britain's COVID - Driven Online Crime Wave

A recent survey reveals over 15 million (29%) of Britons feel unsafe online and 21% report they have been a victim of online identity theft.

Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WEBINAR: How to build a secure access service edge (SASE) model in AWS

WEBINAR: How to build a secure access service edge (SASE) model in AWS

Thursday, 21 October, 2021 - In this webinar, SANS and AWS Marketplace will explore SASE and share how organizations can move to a SASE model to enhance security for modern infrastructures.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

LogicManager

LogicManager

LogicManager offer a complete set of IT governance, risk and compliance software solutions and advisory services.

Oodrive

Oodrive

Oodrive is a European leader in sensitive data management.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Bridewell Consulting

Bridewell Consulting

Bridewell Consulting provide cost effective Security & Risk Assurance Services across Information Security, Cyber Security, Technology Risk, Security Testing and Data Privacy.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.