News

2022-12-22

What Security Issues Do 5G Network Providers Need To Address?

5G is a more complex network technology than 4G and other cellular technologies, and its complexity can be a security problem. By Charlie Svensson

2022-12-21

Reduce Vulnerabilities & Defend Your Brand Against DDoS Attacks

As network architecture evolves, so do DDoS attacks, exposing networks to vulnerabilities in critical applications & processes. By Paul McNamara

2022-12-21

Cyber Threats & Nuclear Fears

Cyber-Nuclear Nexus: The question that surrounds cyber war is not whether it is possible, but what will be the targets of these operations?

2022-12-20

NATO Prepares For Cyber Warfare

The Cyber Coalition 2022 exercise involved more than 40 member states responding to simulated cyber attacks on critical infrastructure.

2022-12-27

Deploying NDR To Transform Threat Detection

Network Detection & Response (NDR) is a powerful solution to help cybersecurity teams detect more and respond faster to threats. By Kev Eley

2022-12-20

What’s In Store For 2023: Cybersecurity Trends

If cybercrime was a country, it would be the world’s third largest economy after the US and China. What can be done to stay cyber secure in 2023?

2022-12-19

Ways Governments Can Better Protect Public Data

For hackers, local and national governments are seen as easy targets - they must dedicate themselves to improving cyber security. By Florian Malecki

2022-12-16

Britain's Cyber Security Laws Get Updated

IT services suppliers will be compelled to have effective cyber security measures in place to protect client data, with fines for non-compliance.

2022-12-16

The Great Resignation

The Quiet Resignation: Five security awareness countermeasures to security threats derived from these workforce trends. By Omer Taran

2022-12-19

Under A Watchful Eye - Unified Observability

Tracking Vulnerabilities: A proper overview of the entire tech stack is vital to anticipate and to protect against security issues. By Matt Tuson

2022-12-15

Congress Wants To Ban TikTok

Anti-Social Act: "TikTok collects data on tens of millions of American every day... We know it’s used to manipulate feeds and influence elections"

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Hack The Box

Hack The Box

Hack The Box is an online platform allowing you to test your penetration testing skills and exchange ideas and methodologies with thousands of people in the security field.

Bellvista Capital

Bellvista Capital

Bellvista Capital connects entrepreneurs with capital and unmatched business expertise in the technology areas of Cloud Computing, Cyber Security and Data Analytics.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

Acuvity

Acuvity

Acuvity is the most comprehensive AI security and governance platform for your employees and applications. Secure your GenAI adoption with confidence.