News

2022-12-15

A New US National Cyber Strategy

Holistic: The US National Cyber Director has a new unified cyber strategy designed to dramatically transform America's cyber security position.

2022-12-14

Remote Work: Three Top Trends In 2023

IT Service Management: Three major trends that will impact remote work and the business practices around it in 2023. By Alexander Draaijer

2022-12-13

Misconfigured Cloud Applications Are Putting Your Data At Risk

Shared Responsibility: When it comes to cloud applications, there’s no such thing as “security that is 100% handled by the vendor.” By Manuel Sanchez

2022-12-13

US Defense Contractors Don't Meet Basic Cyber Security Standards

Defenseless: Almost 90% of US defense contractors do not meet basic cyber security requirements that are considered vital to national security. 

2022-12-13

The Need For OT-centric Cyber Security Strategies

There is an urgent need to improve cyber security for Operational Technology and this must start with education and research. By Reinhard Mayr

2022-12-12

Chinese Hackers Steal $20m US Covid Relief Benefits

Chinese state-sponsored hacking group APT41 took advantage of the chaos caused by the pandemic to steal from a US fund supporting small business.

2022-12-12

The Current Market For Cyber Security Founders & Investors

Strong IP, sustainable growth potential and a large defined addressable market will help start-ups to grow & prosper. By Damien Henault

2022-12-12

The Role Of Policies In Driving ‘Secured Productivity’

Delivering A Strong Security & Privacy Policy: Effective information security & data protection policy is a basic business need. By Scott Richardson

2022-12-07

Resilience Is Essential To Protecting Critical Infrastructure

Risks Of Blackout: Geopolitical tensions are placing pressure on Britain's energy supply, requiring a robust defence to cyber threats By Simon West

2022-12-07

Top Cybersecurity Advice For In-House Counsel

Cybersecurity is a key consideration for any company and has been highlighted as one of the top three issues for chief legal officers. By Robert Kang

2022-12-09

Proactive Security Tips For Your Business After A Security Breach

Has your business fallen victim to a security breach? Consider the benefits of these security tips, tools & technologies to refortify your security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

ObserveIT

ObserveIT

ObserveIT helps companies identify & eliminate insider threats. Visually monitor & quickly investigate with our easy-deploy user activity monitoring solution.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Adyta

Adyta

Adyta specializes in cybersecurity solutions adapted to the needs of sovereign institutions, business groups and other organizations that handle information and sensitive or classified data.

CYMOTIVE Technologies

CYMOTIVE Technologies

Combining Israeli cyber innovation with a century of German automotive engineering. CYMOTIVE operates under the assumption that connectivity is a game changer for the automotive industry.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Emtec

Emtec

Emtec’s cyber security team provides advisory, assessment, & managed security services that help you build the cyber security policies, toolsets & best practices to elevate your cyber security posture

Involta

Involta

Involta orchestrates IT transformation journeys using well-defined and rigorous processes to deliver hybrid cloud solutions, consulting and data center services tailored to our clients’ needs.

iVision

iVision

iVision is a technology integration and management firm that engineers success for clients through objective recommendations, process and technology expertise and best-of-breed guidance.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.