News

2021-07-12

Seven Steps To Create An Effective Disaster Recovery Plan

All organisations need an effective Cyber Disaster Plan in place to reduce the chances of a data loss from a cyber attack or ransomware demand.

2021-07-12

Russian Military Hackers Accused Of Global Campaign

Surprise: The NSA, CISA, FBI & NCSC all agree that Russia's GRU military intelligence agency is behind a damaging worldwide hacking campaign.

2021-07-12

The Qualities That Make A Successful Cyber Team

Skilled cyber security professionals are key for the safety of companies & governments. The US military is aiming to identify the core competencies.

2021-07-09

Britain’s National Cyber Security Strategy

The tumultuous events of the Coronavirus and Brexit have reinforced the importance of cyber security to the UK’s wellbeing & national defence.

2021-07-09

Minimising The Impact Of Ransomware

Ransomware is one of the fastest and more profitable forms of cyber attack and organisations should take measures to minimise the impact.

2021-07-15

CYRIN Have Created Some New Training Options

Creating Training Options: CYRIN Cyber Range has something new - including three new packages – for great new career pathways.

2021-07-08

EU Says That UK Data Protection Rules Are ‘Adequate’

The EU says that UK data protection standards are “adequate” until 2025, but the UK is working on its own data transfer regime to replace GDPR.

2021-07-08

Cyber Insurance - Making The Ransomware Crisis Worse

Some ransomware gangs specifically target victims with cyber security insurance because they think its the best way to guarantee they get paid.

2021-07-08

SANS & AWS Marketplace Webinar: (Re)Defining XDR In AWS

Thursday, July 22th, 2021 | Join this webinar to learn how to build stronger detection capabilities and better response orchestration with XDR.

2021-07-07

EU Sets Up An Emergency Team To Handle Large Scale Attacks

The EU Commission has announced that it will build a rapid response Joint Cyber Unit based in Brussels to combat large scale cyber attacks.

2021-07-07

What Is The Best Defense Against Phishing?

Although virtually everyone knows about phishing and how it works, many people still fall victim, but you can protect yourself. By Ben Hartwig

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

VikingCloud

VikingCloud

VikingCloud (formerly Sysnet Global Solutions) offers organizations an integrated cybersecurity and compliance solution to make informed, predictive, and cost-effective risk mitigation and prevention

Center for Information Technology Policy (CITP) - Princeton University

Center for Information Technology Policy (CITP) - Princeton University

The Center for Information Technology Policy at Princeton University is a nexus of expertise in technology, engineering, public policy, and the social sciences.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Nagios

Nagios

Nagios is a powerful tool that provides you with instant awareness of your organization’s mission-critical IT infrastructure.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

Accompio

Accompio

Accompio offer comprehensive support in the digitalisation of your business processes.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.