News

2022-11-16

Cybersecurity Awareness: Simple Actions To Dial Up Digital Defences

Cyber Criminals Are Awake 24/7: Hackers never sleep and neither should our defences - vigilance & education are critical in the office and at home.

2022-11-16

The Role of Zero Trust Architecture In Minimising Cyber Risks

The ZTA model creates a far more secure environment that protects against unauthorized access to sensitive data. By Dominik Birgelen

2022-11-16

The Internet Of "vulnerable" Things?

Being Smart And Being Secure Are Not Always The Same: How can we be both hyperconnected and secure? By Sarah Daun & Caroline Churchill 

2022-11-15

Privileged & Protected - Managing Access At The Endpoint

Endpoint Sprawl: Clamping down on privileged administrator rights is vitally important to strengthening security posture. By Andy Harris

2022-11-28

How Poor Password Hygiene Could Unravel Your Business

What you need to know about password theft and how organizations can strengthen their password security protocols. By Muhammad Yahya Patel

2022-11-15

Guilty: A Criminal Conviction For One CISO Has Consequence For Others

Doing The Right Thing: Uber’s ex-security chief has been found guilty in a US court - what does that mean for CISOs in the UK? By Nigel Jones

2022-11-14

International Fraud Awareness Week: Every Individual Has A Part to Play

International Fraud Week: As we come into a busy shopping period the cyber experts at McAfee urge consumers to re-evaluate their online habits.

2022-11-14

Why Are Businesses Still Falling Victim To Ransomware?

Industry expert and ex-FBI cyber crime Special Agent Jason Manar, now CISO at Kaseya, answers the key questions for business leaders.

2022-11-10

CISA Reports No Significant Attacks On US Elections

Early warnings were heeded by the local government agencies responsible for running the elections and no significant harm has been identified. 

2022-11-09

The Reality Check For Small & Medium Businesses

Ransomware: Few small & medium sized businesses realize they are just as much at risk as much larger enterprises. By Muhammad Yahya Patel

2022-11-08

Ukraine Uses Artificial Intelligence To Speed Up Attacks

Ukrainian soldiers are successfully applying advanced AI tools to publicly available data, enabling them to produce rapidly actionable information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Computing Technology Industry Association (CompTIA)

Computing Technology Industry Association (CompTIA)

CompTIA is dedicated to advancing industry growth through its educational programs, market research, networking events, professional certifications, and public policy advocacy.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

MCPc

MCPc

MCPc improves the security and well-being of our clients. We protect data, manage the complexity and sustainability of technology, empower employee performance, and ultimately reduce business risk.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Redefine

Redefine

Redefine are Crypto-Native, Cyber Experts, and Blockchain Believers. We are here to make Web3 anti-fragile, safe and accessible to all.

Bedrock Security

Bedrock Security

Bedrock Security is at the forefront of revolutionizing data security in the cloud and GenAI era.

METCLOUD

METCLOUD

METCLOUD is driving a cloud evolution. A cloud that promises relentless cybersecurity, performance, resilience and sustainability.