News

2021-10-26

GCHQ Boss Says Ransomware Attacks Have Doubled In A Year

Ransomware attacks have become increasingly popular with cyber criminal as they are “largely uncontested” and highly profitable.

2021-10-26

Facebook Is 'making hate worse'

Pushing To The Extreme: An ex-employee has made a damning indictment of Facebook, making a powerful impact on British legislators.

2021-10-26

Cyber Security - How Confident (Complacent?) Are You?

How often should organizations review their cyber security strategy? If it's not been done recently, the chances are you’re at risk. By Paul German

2021-10-22

Top Nine Technology Trends Of 2021

The technology industry is evolving fast and keeps improving every passing day. Here are some of the latest technology trends to be aware of.

2021-10-25

Israeli Hospital Attacked With Ransomware

Israel's hospitals have been advised to print out patients’ medical files to ensure operational continuity in case of further attacks.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-10-25

Google Creates Its Cyber Security Action Team

Team Mission: "supporting the security and digital transformation of governments, critical infrastructure, enterprises & small businesses".

2021-10-25

US Cyber Security ‘Kindergarten’ Compared To China

Pentagon CSO Quits: China is heading towards global dominance in AI due to the relatively slow pace of innovation in the United States. 

2021-10-22

Making Sure Your Business Is Cyber Smart

Being cyber smart this Cybersecurity Awareness Month is certainly achievable, but it requires investment of both time and money.

2021-10-20

New Report: Average SIEM Deployment Is Over 6 Months

Real Time: Security Information and Event Management Software (SIEM) allows security teams to keep on top of security alerts as they happen.

2021-10-20

Protecting Your Business Data Using Fake Information

Convincing Decoy: An algorithm can frustrate phishing attacks by generating fake versions of every document that organisations need to protect.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Janusnet

Janusnet

Janusnet develops software and solutions for organisations to enforce and manage data security.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

Tigerscheme

Tigerscheme

Tigerscheme is a certification scheme for information security specialists, backed by University standards and covering a wide range of expertise.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

MER Group

MER Group

MER Group is a world-leading solutions provider specializing in Homeland Security (HLS), Cyber and Intelligence, Communication Infrastructure and Tactical Communication Systems.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

Jobsora

Jobsora

Jobsora is an innovative job search platform in the UK and more than 35 other countries around the world. Sectors covered include IT and cybersecurity.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

SOSA

SOSA

SOSA facilitates new growth opportunities by connecting the dots between industry verticals and innovation ecosystems around the world.

Munich Re

Munich Re

Munich Re is a leading global provider of reinsurance, primary insurance and insurance-related risk solutions including Cyber.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

Hakai Security

Hakai Security

Hakai is a consulting firm specializing in information security that offers customized services and products to meet the needs and goals of each business.

Red Alpha Cybersecurity

Red Alpha Cybersecurity

At Red Alpha, we specialize in recruiting and rigorously training individuals passionate about cybersecurity.