News

2020-11-18

Fake PayPal Emails Cost £8million In Theft

Action Fraud is warning people selling items online to be on the lookout for criminals sending fake PayPal emails with fraudulent intent.

2020-11-17

British National Cyber Security Guidance

The UK Government has issued new guidance to help organisations assess their Risk, avoid Impacts, Anticipate threats & reduce Vulnerability.

2020-11-17

The Data Center Containment Solution Market is Growing

Keep Cool: The demand for data centres is expected to rise owing to increasing adoption of cloud computing applications by business.

2020-11-20

AI Speeds Up Government Policy Decisions

On Trend: The Japanese government plans to introduce an Artificial IntelIigence data analysis system to speed their policy decision making.

2020-11-16

The Rise and Fall Of America’s Unregulated Internet

Internet regulation is coming, driven by concerns over fake news and industrial monopoly. The only question is how heavy it will be. By Ronald Marks

2020-11-16

Cyber Psychology

The Human Factor: A resilient cyber security strategy takes individual personalities into account, just as much as software and systems.

2020-11-16

Using Artificial Intelligence In Business

AI has become a key component in cyber security infrastructure for every business, providing a sophisticated, multi-layered security strategy.

2020-11-13

N. Korean Hacking Group Has New Malware

Kimusky hackers are using new malware to drive information-stealing attacks against COVID-19 vaccine makers and other critical targets.

2020-11-13

Game-Changing Cyber Security Technology

Using iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection & self-aware security.

2020-11-12

The Market For Remote Desktop Software Is Set To Boom

Coronavirus is driving the demand for remote desktop software as organisations adopt remote working to maintain their day-to-day operations.

2020-11-11

Russian Turla Hackers Specialise In Attacking Government Agencies

US Cyber Command has exposed several new malware samples developed and deployed by Russian hackers to attack government agencies.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

PDI Technologies

PDI Technologies

PDI Technologies helps convenience retail and petroleum wholesale businesses around the globe increase efficiency and profitability by securely connecting their data and operations.

Nyx Technology

Nyx Technology

Nyx Technology is your dedicated partner in navigating the intricate world of cyber security, providing you with cutting-edge threat intelligence to safeguard your digital assets.