News

2021-02-10

Data Privacy & You

Trust: Consumers are willing to trade their personal data for personalisation, but they also have growing concerns about data privacy.

2021-02-09

Use The Military To Attack Hackers

The former chief of CISA says the US military should hit back at the cyber criminals that have hacked government agencies and organisations.

2021-02-09

Losses From Cyber Crime Exceed $1Trillion

Cyber criminals are shifting focus from individuals and small businesses to major corporations, governments and critical infrastructure.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-08

Cloud Migration Challenges For Healthcare Organisations

The Coronavirus has forced healthcare organisations to speed up cloud migration, which may actually leave them at a higher level of risk.

2021-02-08

More Critical Problems With SolarWinds

SolarWinds have learned of three more critical vulnerabilities with their software which could allow an attacker to steal their customers' vital data.

2021-02-08

Myanmar’s New Military Rulers Block Facebook

For many of the population social media is their only access to the Internet and Facebook has become a rallying point against the military coup.

2021-02-10

Webinar: Architect a security-driven networking strategy in the AWS Cloud

Learn how to create a security-driven networking strategy for the AWS Cloud - technologies, processes, and policies. Thursday, February 25th

2021-02-05

Bug Bounty & Crowd-Sourced Cyber Security

As the importance of cyber security to the economic survival of companies grows, many more CISOs are turning to ethical hackers for help.

2021-02-05

Amazon Phishing Emails

Beware: An email from Amazon 'Fraud Prevention Support' is most likely the complete opposite of what it appears to be.

2021-02-05

Pro-Active Cyber Protection

Antivirus tools are becoming ineffective against advanced attacks. Moving target endpoint defense technology from Morphisec is a powerful solution.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security

Phoenix Contact Cyber Security is a leading manufacturer of network security appliances for use in industrial environments.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

NATO Communications and Information Agency (NCIA)

NATO Communications and Information Agency (NCIA)

The NCIA Cyber Security Service Line is responsible for planning and executing all life cycle management activities for cyber security.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

Forgepoint Capital

Forgepoint Capital

ForgePoint Capital is a premier venture investor for early stage cybersecurity companies.

US Army Cyber Command (ARCYBER)

US Army Cyber Command (ARCYBER)

US Army’s Cyber Command (ARCYBER) is engaged in the real-world cyberspace fight today, against near-peer adversaries, ISIS, and other global cyber threats.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Darktrace

Darktrace

Darktrace is a global leader in cybersecurity AI, delivering complete AI-powered solutions in its mission to free the world of cyber disruption.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.