News

2021-07-19

IISS: Cyber Capabilities & National Power Rankings

Cyber capability underpins military power and can radically affect national decision-making. Currently the US has superiority over numerous contenders.

2021-07-17

For Sale - Dark Web Exploits

Older exploits are cheaper and remain useful to cyber criminals for longer. Its just as important to update and patch for these as for Zero-Days.

2021-07-16

Microsoft Buys RiskIQ

RiskIQ offers threat intelligence & cloud-based software used by 30% of the Fortune 500 and more than 6,000 organisations around the world.

2021-07-16

How B2B Companies Can Use Cyber Security For Data Protection

For optimum data protection, actionable intelligence needs to be followed up with robust cyber security solutions. By Lidia Hovhan

2021-07-15

Cyber Security Careers for Women

When news of state-sponsored attacks or massive data breaches are a daily event, it seems crazy that for many, cyber security is a closed door.

2021-07-14

Over 40% Of UK Organisations Reported To ICO Since GDPR

A survey suggests a lack of cyber resilience, with IT leaders having difficulty locating & securing data and in understanding their GDPR data obligations.

2021-07-14

British Police Double Down On CyberAlarm

A free police-led monitoring tool helps business users understand malicious online activity and improve their security and cyber resilience.

2021-07-12

The Five Most Common Security Mistakes At Work

Remote working has its benefits but working from home is very risky. Here are some of the most common mistakes to avoid. By Elizabeth Hines

2021-07-13

Biden Warns Putin The US Will React To Attacks

Following a wave of damaging ransomware incidents Biden has told Putin the US will take "any necessary action" to stop further Russian attacks.

2021-07-12

The Post-Covid Cyber Security Challenge

The post-pandemic recovery presents the opportunity for organisations to rebuild a 'new normal' with much better resilience as the goal.

2021-07-12

India’s New National Cyber Security Strategy

The new strategy is a guideline for governance, national data resources, building indigenous capabilities and cyber audit standards.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

Shavlik Protect

Shavlik Protect

Shavlik Protect is an easy-to-use security software solution that discovers missing patches and deploys them to the entire organization.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

VaultOne

VaultOne

VaultOne is a next-generation security solution that addresses security issues from different domains (Password Manager, Secure Access, PAM, Identity Management) as a single, integrated solution.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

ST Engineering Antycip

ST Engineering Antycip

ST Engineering Antycip (formerly Antycip Simulation) is Europe’s leading provider of professional grade COTS simulation software, projection & display systems, and related engineering services.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.