News

2021-08-16

Ransomware Attack On Accenture

If a global business consulting firm like Accenture can fall victim to a known ransom method like Lockbit, then hardly any business is secure.

2021-08-13

Suspected Russian Spy Arrested

A man working at the British Embassy in Berlin has been arrested on suspicion of spying, accused of passing details of the WiFi network to Russia.

2021-08-13

One Million Stolen Credit Cards Hit The Dark Web

The Russian cyber criminal group AllWorld.Cards has released 1 million stolen credit cards on to the Dark Web to sell payment credentials online.

2021-08-12

Cyber Crime In 2025

The global cost of cyber crime could reach over $10 trillion by 2025. It's vital that governments & businesses invest in their cyber security.

2021-08-11

Stolen: Over $600 Million In Crypto Currencies

Decentralised Finance: $273m in Ethereum, $253m in Binace Smart Chain tokens and $85m in other currency looted from a blockhain exchange.

2021-08-11

New CSPM Report Highlights The Perceived Security Gap For Cloud Infrastructure

There could be a significant gap between the level of cloud security that you think you have and the level of protection that you actually have.

2021-08-10

Japan’s New Cyber Security Strategy

Japan's new three year national Cyber Security Strategy mentions a country that poses a threat to its national security - that country is China.

2021-08-10

Endpoint Security Is More Important Than Ever

The big increase in home working makes endpoint security critically important to protect remote workers and IT professionals. By Eileen Harrison

2021-11-12

Cyber Operations In Wartime

Policymakers and military leaders need to broaden their assumptions about how state and non-state actors will use cyber operations in future conflicts.

2021-08-10

Alarming Surge In Malicious Apps

Mobile users suffered 200% more malicious apps in the first half of 2021 compared to 2020 and its a particularly serious threat for iPhone users.

2021-08-11

Apple Uses Surveillance To Detect Child Abuse

The next generation of iOS will be set up to automatically scan connected devices to identify if they contain media featuring child sexual abuse.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CoSoSys Endpoint Protector

CoSoSys Endpoint Protector

Endpoint Protector by CoSoSys is an advanced all-in-one DLP solution for Windows, macOS, and Linux, that puts an end to unintentional data leaks and protects from malicious data theft.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

mPrest

mPrest

mPrest is a global provider of mission-critical monitoring and control solutions for the defense, security, utility and Industrial Internet of Things (IoT) sectors.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

OISTE Foundation

OISTE Foundation

OISTE foundation allows users to control their digital identities using well-understood and secure algorithms that ensure the continued validity of an identity and its claims.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

Atlant Security

Atlant Security

Atlant Security is a cyber and IT security company offering consulting and implementation services.

Herzing College

Herzing College

Herzing College Ottawa offers an accelerated 12-month Cybersecurity Specialist training program. This program is developed by industry experts and based on leading IT security certifications.

Buchanan Technologies

Buchanan Technologies

Buchanan Technologies is a leading IT consulting and outsourcing services firm. Our methodology transforms everyday technology investments into streamlined, secure and scalable solutions.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.