News

2021-02-16

Spotless Data

Manufacturers need accurate, reliable and clean data to run their processes. But what is data hygiene and how is it achieved? By Neil Ballinger

2021-02-16

Myanmar’s Cyber Security Bill

Myanmar’s military coup leaders have produced a draconian cyber security bill that gives the government sweeping powers over the Internet.

2021-02-16

3D Secure Authentication: What Is it, And Why Do I Need It?

3D Secure Authentication uses layers of consumer and merchant information to provide additional security for online purchases. By George J Newton

2021-02-16

British Parliament Wakes Up To Huawei

British MPs warn the government to be proactive with legislation on emerging technologies and learn from its flip-flop over Huawei's 5G system.

2021-02-15

Get Your Cyber Security Plan In Place Now

A cyber threat intelligence plan is more important than ever and now is the time for all organisations to sort out their cyber security strategy.

2021-02-12

5G Will Disrupt Cyber Security

The transition to 5G will enable the connection of billions of new devices and means an overhaul of infrastructure.The stakes could not be higher.

2021-02-12

Hiring Good Cyber Security Professionals Is Hard Work

Concerns over inadequately qualified cyber security job applicants persist, even as demand to fill increasingly well-paid jobs remains strong.

2021-02-12

Instagram, TikTok & Twitter Shutdown Stolen Accounts

The big social media companies work together to frustrate the theft and re-sale of high-value usernames on the OGUsers cyber crime market.

2021-02-11

Cyber Security In Higher Education

In both culture and technology, universities are among the most open and outward facing sectors. Unfortunately, this makes things easy for attackers.

2021-02-11

How To Create Effective Cyber Security Training For Employees

Prevention Is The Best Solution: Cybersecurity training is the best tool for effective prevention and protection from cyber attacks. By Kristin Savage

2021-02-10

Russian Government Warns Business Of US Cyber Attack

The Russian government has issued a cyber security warning to organisations at risk of US reprisals for the devastating SolarWinds attacks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

At-Bay

At-Bay

At-Bay is the world’s first InsurSec provider designed from the ground up to help businesses tackle cyber risk head on.

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum (GCF)

Global Cybersecurity Forum is a catalyst platform designed to create a more resilient and better cyberworld for all.

Orchestra Group

Orchestra Group

Orchestra Group offer a unique integrated cybersecurity defense platform with proactive security policy management and enforcement orchestration.

Brighterion

Brighterion

Brighterion solutions stop payment and acquirer fraud, reduce credit risk and delinquency, fight financial crime, prevent healthcare fraud, waste and abuse, and more.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

Campus cyber

Campus cyber

A project initiated by the President of the Republic, the Cyber Campus is the totem site of cybersecurity that brings together the main national and international players in the field.

Custard Technical Services

Custard Technical Services

Custard provide Network Security for all types of businesses across many industries, helping to keep them safe and secure.

Unisys

Unisys

Unisys is a global information technology company providing industry-focused solutions integrated with leading-edge security to clients in the government, financial services and commercial markets.

QFunction

QFunction

QFunction works within your existing security stack to detect anomalies and threats within your data.

Fivecast

Fivecast

Fivecast is enabling a safer world. We help organizations around the world explore masses of data to uncover actionable insights.

Cyex

Cyex

Cyex helps people to become cyber wise. We enable our clients to find, track and improve cyber awareness in one place.