News

2021-01-05

How Nation States Use Their Cyber Power

The US and Chinese governments both use cyber attacks as instruments of policy and as technology improves, a cyber arms race grows imminent.

2021-01-05

The Cyber Security Top Ten Power List

To update Chairman Mao's belief that political power grows from the barrel of a gun, in the 21st century, it emerges via a computer keyboard.

2021-01-05

AI Will Soon Replace Cyber Security Staff

Cyber Security jobs will eventually be entirely automated and some professionals think that they will be replaced by AI in the next ten years.

2021-09-21

Take Your Network Security One Step Further

A Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and remote workforce.

2021-01-04

AI Is The New Weapon In The Cyber Arms Race

Many experts believe that ArtificiaI Intelligence will have a significant impact on warfare and will transform how armed conflict is conducted.

2021-01-04

Detecting Rogue Mobile Devices

Controlling which mobile devices can connect to your network is crucial to ensuring the privacy and integrity of corporate assets and data.

2021-01-04

Six Big Features Of Cyber Security In 2021

The Coronavirus, a big increase in cyber attacks and the impact of increasingly sophisticated hackers were all big in 2020. What's next?

2021-01-04

Cyber Attacks On US Government - New Evidence

The wide ranging & successful cyber attacks on US government agencies by Russian hackers may have begun long before their discovery.

2020-12-30

Cyber Security In 2021 - Predictions & Trends

Every passing year gets worse for cyber security as improved cyber defences are matched at every step by the increasing sophistication of criminals.

2020-12-29

The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit trade deal, but what does this mean for British cyber security?

2020-12-29

How to Close the Global Cybersecurity Skills Gap: Two Easy Steps

Although it seems a big challenge, closing the cyber security skills gap can be conducted with only two simple steps. By Jennifer Holland

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

RU-CERT

RU-CERT

RU-CERT is the CSIRT / CERT team of the Russian Federation.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Cynance

Cynance

Cynance are an award-winning, independent cyber security specialist and part of the Transputec family of companies.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

North West Cyber Resilience Centre (NWCRC)

North West Cyber Resilience Centre (NWCRC)

The North West Cyber Resilience Centre is a trusted, not-for-profit venture between Greater Manchester Police and Manchester Digital.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

Cyber Castellum

Cyber Castellum

Cyber Castellum is a cybersecurity consulting firm that specializes in the identification of security vulnerabilities in an organization’s technology landscape.