News

2022-05-02

Cyber Attacks On Ukraine Are Increasing

Espionage & Intelligence: Attacks on Ukraine targets have tripled since the attempted invasion when compared with the same period last year.

2022-05-02

Three Vital Concerns For Companies Running Hybrid Cloud Environments

The threat of a data breach and data loss is a dangerous possibility for companies that run hybrid cloud environments. By Florian Malecki

2022-04-29

FBI Is Looking For BlackCat

Wanted: IP addresses, Bitcoin addresses, transaction IDs, communications and a sample of an encrypted file to catch prolific criminals.

2022-05-06

Enhance Security In Your AWS Cloud

AWS SECURITY WEBINAR: Securing your cloud environment with endpoint and network detection and response (EDR/NDR) technologies.

2022-04-29

The Role Of AI In Data Analysis

Today, AI is capable of performing at the same skill level as humans but with the advantages of high scalability and no need for pauses.

2022-04-28

Cyber Criminals Increasingly Focus On Mobile Devices

Mobile platforms supply an ever increasing number of distributed endpoints and their security is no longer an option for businesses. By Ian Porteous.

2022-04-28

Identity Access Management Essentials

Identity & Access Management (IAM) is a critical element of an organisation's IT infrastructure and its importance is growing. By Stefan Nilsson

2022-04-27

European Union Has Rules On Illegal Online Content

The EU Digital Services Act will give effect to the principle that what is illegal offline, should be illegal online, with very big penalties.

2022-04-27

Cyber Security Training Reduces Cyber Attacks

Take Action: Cyber criminals often choose to attack organisations with weak cyber training expertise. We recommned you GoCyber.

2022-04-27

Twitter, Free Speech & Disinformation

Elon Musk’s purchase of Twitter might mean the site will do even less to moderate extremism, hate speech, fake news and disinformation.

2022-04-26

Digital Experience Monitoring - The Future Of Remote & Hybrid Work

Digital Experience Management is the ideal strategy for measuring the impact of the digital experience on productivity. By Naveena Srinivas

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Cyberspace Solarium Commission (CSC)

Cyberspace Solarium Commission (CSC)

The Cyberspace Solarium Commission was established to develop a consensus on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences.

NINJIO

NINJIO

NINJIO is a leader in cybersecurity awareness training. View IT Security Awareness through a different lens - entertain and educate your users through storytelling.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Coalition for Secure AI (CoSAI)

Coalition for Secure AI (CoSAI)

CoSAI is an open ecosystem of AI and security experts from industry leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.

EasySec Solutions

EasySec Solutions

EasySec Solutions provides a cyber-security platform, based on a combination of the zero trust model and the software-defined security management.

Infosec Ventures

Infosec Ventures

Infosec Ventures incubates and scales cyber security innovators that solve inefficiencies in cyber security.

Arms Cyber

Arms Cyber

Arms Cyber is redefining ransomware defense with advanced solutions that stop attacks before they start.

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.