News

2022-03-21

What Goes On In The Dark Web?

The Dark Web is that part of the Internet that can only be accessed by those in the know, using specific software and configurations to get access.

2022-03-14

Google Buys Mandiant For $5.4bn

Mandiant's highly skilled workforce of cyber security experts will be folded into Google Cloud to create an “end-to-end security operations suite.”

2022-03-15

Cyber Innovation And Industry 4.0

The world is changing technologically faster than ever before, creating new industries, changing existing ones and transforming how things work.

2022-03-14

Zero Trust In The Boardroom

Cyber Security Is A Top Priority For Business Leaders: Reasons why CEOs need to have Zero Trust at the front of their minds. By Rajesh Khazanchi

2022-03-14

AI Is The Future Of Defensive Cyber Security

AI can help reduce costs, improve threat response times and respond to breaches, regardless of the  specific circumstances in which it is used.

2022-03-12

New Tools To Detect Cyber Attacks

Automated monitoring of fluctuations in energy consumption across networks can help detect and protect critical IT infrastructure from hackers.

2022-03-10

Twitter Joins Ukraine’s War Effort

Twitter has been a powerful weapon in many conflicts, used to spread propaganda & fake news. Now, it has picked a side and will defend Ukraine.

2022-03-10

A Cyber Attack On NATO Could Trigger Article 5

In the era of 'hybrid warfare' will NATO respond to a cyber attack on a member state in the same way as it would to an armed miiltary attack?

2022-03-09

Making Sense Of The Edge

Manufacturing’s big data has quickly become colossal, and Edge Computing can perform a vital role in the modern smart factory. By Martyn Williams

2022-03-08

Microsoft Exchange Exploited By ‘Cuba’

The Cuba ransomware gang target vulnerabilities on public-facing Microsoft Exchange software to detect susceptible networks.

2022-03-09

NATO Tests A Post-Quantum VPN

Post-Quantum technology provides different powerful algorithms to ensure security, even when facing attackers using quantum computing.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Imperva

Imperva

Imperva is a leading provider of data and application security solutions including DDoS protection, Web application security, Data security and Cloud security.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Wizlynx PTE LTD

Wizlynx PTE LTD

Wizlynx PTE LTD is the Singapore branch of Wizlynx Group located in Singapore, offering Information and Cyber Security Services throughout the entire Asia Pacific (APAC) region.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

African Cyber Security

African Cyber Security

African Cyber Security and it's partners, have the expertise and skills to provide holistic solutions for companies, institutions and government.

CoverWallet

CoverWallet

CoverWallet combines deep analytics, thoughtful design and state of the art technology to help small businesses with all their insurance needs including Cyber Liability.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

Cyber Industrial Networks

Cyber Industrial Networks

Cyber Industrial Networks objective is to service the needs of industry in achieving reliable, robust and secure infrastructure that supports productivity.

Fusion5

Fusion5

Fusion5 is a leading ANZ Business Services and IT Solutions provider. Our customers trust us to make their potential reality by providing advisory, IT project deployment, and managed services.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.