News

2022-05-14

Bitcoin Tanks

Widely used to facilitate cyber crime, frustrate law enforcement, evade regulation and guzzle energy, it turns out Bitcoin is also a lousy investment.

2022-05-16

Investment Scams Are Increasing

Britain's financial regulator is warning people to beware of fake financial advisers offering investment schemes via online meeting platforms.

2022-05-16

Threat Hunting Solutions

It's crucial for organizations to utilize proactive cyber threat hunting in building, securing and maintaining their security infrastructure.

2022-05-16

Costa Rica Declares A State Of Emergency Following Cyber Attacks

The Conti cyber crime group are holding the government of Costa Rica to ransom in a wide -ranging attack that has knocked state agencies offline.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-10

The Cyber Security Investment Boom Continues

M&A activity grew to over $70 billion in 2021and reached almost $27 billion by the end Q1 2022, but there are signs investors are getting cautious.

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-05-09

Anonymous Launch An Attack On Rosneft

The hacking collective Anonymous claim they have stolen 20 Terabytes of data from a major Russian oil company, knocking its systems offline.

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-09

A History Of Cyber Security

Understanding the history of cyber security may help shed some light on how to take effective steps to keep Internet users safe today.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

IDpendant

IDpendant

IDpendant offers a wide range of services, including authentication technology, client security products, single sign on systems, encryption solutions, card and mobile device management systems.

Secberus

Secberus

SECBERUS creates cloud security technology to help organizations stay secure & compliant in the public cloud.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

UTMStack

UTMStack

UTMStack is a Unified Security Management system that includes SIEM, Vulnerability Management, Network and Host IDS/IPS, Asset Discovery, Endpoint Protection and Incident Response.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

GTT Communications

GTT Communications

GTT are a global network provider that serves thousands of multinational and national enterprise, government and carrier customers with a portfolio of advanced connectivity and security services.

CyberXposure

CyberXposure

CyberXposure has been built by a team comprising of Cyber Security Professionals and SAAS experts in data backup, disaster recovery and cyber-security.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

US Insider Risk Management Center of Excellence (US-InRM)

US Insider Risk Management Center of Excellence (US-InRM)

The US-InRM Center of Excellence is a nonprofit organization dedicated to promoting private, public, and academic partnerships to foster knowledge sharing and resources to mitigate insider risk.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.