News

2020-07-31

The Costs Of A Data Breach

The total cost of a data breach to a major business has reached a whopping $3.9m. It's not just money - reputation, credibility and trust are at stake.

2020-07-30

Women In Cyber Security Are Paid Much Less Than Men

There is still a shortage of women in the global cyber security workforce - not least because they are paid 21% less than men doing the same job.

2020-07-30

Hollywood Site Leaks Personal Data Of 260,000 Actors

The information exposed includes full profiles of over 260,000 users along with very sensitive personal information and access to photographs.

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

2020-07-27

Home Working Cyber Security Toolkit

Home working staff can test their defences against online threats in a new roleplay exercise devised by the UK National Cyber Security Centre.

2020-07-27

US National Cyber Defense Policy

The US Government will spend $740 billion on its cyber defenses next year, co-ordinating public and private response to threats for the first time.

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-22

The British Government 'badly underestimated' Russian Political Interference

A critical official Parliamentary Report says that the UK government made no effort to investigate Russian interference in its democratic processes.

2020-07-21

Malware Found In Chinese Banking Software

Discovered: Malware embedded in tax software that Chinese banks require corporations to install to conduct business operations in China.

2020-07-30

Easing Out Of Lockdown: Why Should Cyber Security Remain High On The Agenda?

With the dramatic impact of Coronavirus across the globe and remote working prevalent, now is the perfect time to get your cyber security in order.

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CLCERT

CLCERT

CLCERT is dedicated to the monitoring and analysis of the security problems of computer systems in Chile, and the generation of both knowledge and specialized human resources to ensure these systems.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

Omada

Omada

Omada is a leading provider of IT security solutions and services for identity management and access governance.

Inovasys

Inovasys

InovaSys serves the MENA region with the most advanced IT infrastructure, data security, wireless solutions and data centers solutions.

Cybercrime Services

Cybercrime Services

Cybercrime Services offer professional advice, training, legal assistance, technical solutions and insurance to provide you with all you need to help prevent a cyber attack or data breach.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Tesserent

Tesserent

Tesserent offers world-class managed security at your network perimeter, internal behavioural monitoring and end-point device protection.