News

2021-08-26

Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution

The storage & processing of massive quantities of internet data sparked the simultaneous usage of big data and cloud computing. By Ryan Jason

2021-08-26

Islamic State Propaganda Is Persistent

Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns and they are definitely not going away.

2021-08-25

British Military Aim To Reduce Their Attack Surface

Reducing Vulnerabilities: Britain's defence sector presents a large target area for cyber attackers to penetrate and disrupt UK military operations.

2021-08-24

Businesses Pay A High Price For Automated Bots

Automated bots operated by criminals are costing businesses an average of 3.6% of their annual revenue and can remain undetected for months.

2021-08-24

Business Leaders Can Make Big Mistakes About Cyber Security

Businesss leaders face a higher level of personal jeopardy for inadequate cyber security and they need to avoid making some dangerous mistakes.

2021-08-26

Webinar: Adapting detection and response strategies to the cloud

Thursday, September 9th | AWS Marketplace webinar: Adapting detection and response strategies to the cloud | Live Regional Versions

2021-08-23

Seven Ways That Social Media Sabotages Cyber Security

Warning: Having a social media webpage affects your cyber security. Although social media can do a lot for you, it can also take a lot away from you.

2021-08-23

T-Mobile Customers Affected By Massive Breach

T-Mobile has admitted to a sophisticated attack and now the stolen personal data of as many as 54 million US customers could be up for sale.

2021-08-23

US State Department Under Attack

The US State Department which handles America's foreign relations has disclosed it has been the victim of a mysterious attack by persons unknown.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

2021-08-20

Vaccine Passport Scams

Action Fraud: Britain's online crime reporting portal has issued a warning about fake National Health Service emails offering a 'Vaccine Passport".

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

Bricata

Bricata

Bricata offers industry-leading IPS solutions for enterprise-wide threat prevention and unparalleled situational awareness.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Imageware

Imageware

Imageware is a leader in biometric cybersecurity. Protect against costly, damaging ransomware hacks by employing biometric cybersecurity solutions.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

Match Systems

Match Systems

Match Systems provides blockchain investigations, KYC, KYT, AML, Due Diligence and compliance services.

Foresiet

Foresiet

Foresiet is the first platform to cover all of your digital risks, allowing enterprise to focus on the core business.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.