News

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

2022-01-06

Russia Fines Google For Illegal Content Breach

Google is fined 7.2 billion roubles in a revenue-related penalty for the repeated failure to delete content which is illegal under Russian law.

2022-01-05

Pegasus Spyware & Not-For-Profit Cyber Security - What Are The Risks?

It's never been more important for charities to prioritise their cyber security, especially for those involved in humanitarian efforts. By Kitty Bates.

2022-01-04

The Top 10 Most Severe Vulnerabilities In 2021

Gain insights into the top 10 most critical vulnerabilities of 2021 to ensure that your system is not a sitting duck for remote attackers.

2022-01-04

Disinformation Is A Prevalent Threat

Disinformation-For-Hire: Advertising, Marketing and PR companies are busy manipulating online opinion for politicians & governments.

2022-01-04

The Cyber Security Risks Of Outsourcing

Out Of Control: IT outsourcing is a major contributor to cyber security risk exposure and the consequences of a breach can be very damaging.

2022-01-03

Artificial Intelligence Monitors Critical Infrastructure

Artificial Intelligence and video surveillance tools are being being increasingly adopted to monitor and protect critical infrastructure facilities.

2022-01-03

NSO Spyware Used To Hack Political Leaders In Poland

Spyware from NSO Group has been used in the hack of leading opposition politicians in Poland, in the latest instance of covert surveillance.

2022-01-03

Cyber Attack On Britain’s Defence Academy

A damaging attack on Britain's national Defence Academy, possibly by Russia or China, is an indication of how modern warfare is evolving.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

DataNumen

DataNumen

The fundamental mission of DataNumen is to recover as much data from inadvertent data disasters as possible.

INFRA Security & Vulnerability Scanner

INFRA Security & Vulnerability Scanner

INFRA is a powerful platform with an easy interface for any kind of Ethical Hacking, from corporate monitoring and VAPT (vulnerability assessments and penetration testing) to military intelligence.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Pratum

Pratum

Pratum is an information security services firm that helps clients solve challenges based on risk, not fear.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

Cyber Overwatch

Cyber Overwatch

Cyber Overwatch holds your hand, giving you the tools to detect threats, monitor your cyber footprint, and secure your organisation, before attackers strike.