News

2022-05-23

CISA Detect Vulnerabilities In VMWare Products

Random Disconnection: CISA says unpatched VMWare devices should be considered to be compromised and need to be urgently checked.

2022-05-23

Canada Bans China From Its 5G Networks

Canada's telecoms operators are no longer allowed to use Huawei & ZTE gear. Those that have already installed their equipment must remove it. 

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

2022-05-19

Conti Attack US Precision Engineering Business

A leading maker of aerospace systems has confirmed that it was hit by hackers, who then exposed employees’ personally identifiable information. 

2022-05-19

Never Trust Anything Again - The Zero Trust World

Organisations must abandon the ‘trust everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard

2022-05-18

A Short History Of Cyber Crime - Part 1- Its Motivations

Cyber crime is human criminal behavior but amplified, empowered & delivered with unprecedented power and greater opportunity for concealment.

2022-05-17

Elon Musk's Deal To Buy Twitter Comes To A Standstill

Twitter is having problems calculating just how many fake accounts are on their platform and it could be Elon Musk wants to renegotiate the terms.

2022-05-23

Why Data Storage Is the Number One Cyber Recovery Strategy

Avert the worst consequences of cyber crime: Create multiple backups of your files, keeping your business safe from major data disasters.

2022-05-18

Google’s New Security Features

Google is giving users much more control over personal privacy and the adverts they are served, as well as better security for online payments.

2022-05-17

British Cyber Security At Risk From Russia

Britain's security Minister and his spy agency chiefs agree that the cyber war in Ukraine is spreading and a nationwide response is needed.

2022-05-17

The Big Cyber Security Threats That You Can Prepare For

No organisation is safe online. There are a wide range of risks and the best defence is awareness of the major types of threat and proper training.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Forensic Control

Forensic Control

Forensic Control specialise in providing simple & straightforward Cyber Security to organisations, helping them assess, prevent and respond to cyber threats.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

CyberGuru

CyberGuru

CyberGuru is a service provided by CyberSecurity Malaysia specializing in cyber security professional training and development.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Elpha Secure

Elpha Secure

Elpha Secure provides a comprehensive cybersecurity solution, combining technology and insurance to protect against cyber threats.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Cloud Seguro

Cloud Seguro

Cloud Seguro are leaders in the development of cloud solutions, Ethical Hacking, Privacy and Information Security.

Converged Communication Solutions

Converged Communication Solutions

Converged is an independent Internet Service Provider, telephony, IT support and security specialist.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.