News

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-06

Russia’s Strategy For Information Warfare

Information Warfare: Its not just about hacking devices, shutting down pipelines and stealing data. Russian strategy is more subtle and stealthy.

2021-09-03

The Cyber Security Market Is Booming

The global cyber security market size was valued at $167 billion in 2020 and is expected to grow 11% year on year for at least the next five years.

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-09-01

AWS Marketplace presents: How to integrate security into the DevOps pipeline

Thursday, September 16th | Join this webinar to learn how you can empower your developers with integrated DevOps pipeline security in AWS.

2021-08-31

Social Media Tries To Protect Afghan Users

Facebook, Twitter and LinkedIn have moved to secure the accounts of users worried for their safety under the Taliban regime in Afghanistan.

2021-08-31

China Has A 3-Year Plan For Cyber Security

China is increasing efforts to protect national cyber security and will strengthen IT infrastructure & resilience with new security regulations.

2021-08-30

Hackers Steal $100m From Japanese Cryptocurrency Exchange

Liquid Assets: Around $97m in Bitcoin and Ethereum tokens have been spirited away from a 'warm wallet' operated by a leading exchange.

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-31

US Tech Giants To Spend Billions On National Cyber Security

Apple, Amazon, Google, IBM and Microsoft have promised to invest billions of dollars to strengthen cyber security and train skilled workers.

2021-08-30

Taliban Have Control Of US Biometric Technology

HIIDE: The Taliban has got hold of devices containing iris scans, fingerprints & biographical information used to access verified ID databases.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Micron Technology

Micron Technology

Micron is a global leader in the semiconductor industry providing memory and secure storage devices for Networks, Mobile devices and IoT applications.

Gate 15

Gate 15

Gate 15 provide risk management services focusing primarily on information, intelligence and threat analysis, operational support and preparedness.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

Network Intelligence

Network Intelligence

Network Intelligence delivers a comprehensive suite of AI-powered cybersecurity solutions built on the ADVISE framework.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

VP Techno Labs

VP Techno Labs

VP Techno Labs is an award-winning cybersecurity firm focusing only cybersecurity to develop cutting edge solutions for emerging business.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Red Alpha Cybersecurity

Red Alpha Cybersecurity

At Red Alpha, we specialize in recruiting and rigorously training individuals passionate about cybersecurity.