News

2021-12-31

Best Programming Languages For Cyber Security In 2022

Knowing a programming language can help individuals know where vulnerabilities in software may exist as well as how to overcome them.

2021-12-13

Critical Fault with Log4j Software

Alert: Attackers are exploiting a critical vulnerability in Apache Log4j, a logging library that's used in millions of Java-based applications.

2021-12-10

Britain's New Deals On Digital Trade & Cyber Security

Britain has entered separate new long term cyber security arrangements with Israel and Singapore to frame new technology & future digital standards.

2021-12-10

Boris Johnson's Cabinet Office Fined £500k For Leaking Data

The British Government department responsible for supporting Prime Minister Boris Johnson pays the penalty for breaking GDPR rules.

2021-12-31

Cyber Security In 2022

Strategic & Tactical predictions for the digital ecosystem, which faces even more challenges & numerous sophisticated threats in 2022. By Chuck Brooks

2021-12-08

How Good Is Your Resilience Testing?

Backup: Any resilience measure must be tested on a regular basis, and not just when the ‘stuff’ has hit the fan. By Colin Tankard

2021-12-08

Amazon Cloud Outage Affects Major Customers

The extent to which major companies in retail, media, logistics, financial & other critical services rely on the outsourced cloud provider is exposed.

2021-12-07

Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts in an effort to limit the influence of manipulation and disinformation operations on the platform.

2021-12-07

Multiple Location Supermarket Suffers Supply Chain Attack

Total IT Outage: 300 Spar convenience stores in the UK have been knocked offline, unable to process card payments as their IT supplier is attacked.

2021-12-07

Cyber Attacks Should Be The #1 Concern For Business Leaders

Prevention Is The Priority: Over 80% of board directors surveyed identified cyber attacks as the biggest threat that their business currently faces.

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Ahope

Ahope

Ahope is a mobile security solution provider in Korea with a long history of security solution development.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

CyRise

CyRise

CyRise is a venture accelerator focused squarely on early stage cyber security startups.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

RCMP National Cybercrime Coordination Unit (NC3)

RCMP National Cybercrime Coordination Unit (NC3)

As set out in the Government of Canada's National Cyber Security Strategy, the RCMP has established the National Cybercrime Coordination Unit (NC3).

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

GetHacked.ca

GetHacked.ca

GetHackded.ca is a certified company offering penetration testing and specialized cybersecurity services.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Nexsan

Nexsan

Nexsan offers versatile and robust data storage solutions tailored to adapt seamlessly across a diverse range of sectors, ensuring reliable performance for critical data management.