News

2020-11-11

The Five Best Ways To Secure Your Cloud Environment

Cloud migration is almost complete for many businesses. Unfortunately, cloud account breaches are increasing. What's to be done? By Mina Khaki

2020-11-10

Cyber Security For SMEs

It's Not Only Big Businesses: According to the insurance industry, one SME in the UK suffers from a cyber attack every 19 seconds.

2020-11-10

Fake News Is A Big Problem For CISOs

Beware: Fake News, Misinformation and Disinformation campaigns are just as bad for businesses as they are democratic elections.

2020-11-09

Taiwan Company Guilty Of Semiconductor IP Theft

Trade Secrets: A Taiwan chip manufacturer conspired with China to steal critical technology from a US semiconductor design company.

2020-11-09

Criminals Have Ramped Up Covid-19 Related Attacks

Over 25% of the cyber attacks that were dealt with by the British NCSC over the past 12 months were Covid-related.

2020-11-09

Cyber Warfare Is The New Frontier

The Future Of Conflict: In an accelerating cyber arms race, there is a lack of clear international rules governing the use of cyber weapons.

2020-11-07

How to Transition From Remote Work To A Secure & Agile Workforce

The sharp transition to remote working has huge challenges, related to data security, workstation access & organization compliance. By Mary Bird.

2020-11-06

Criminal Use Of Artificial Intelligence

From targeted phishing campaigns to adversarial networks, here are just some of the ways that AI can be used to launch criminal cyber attacks.

2020-11-05

US Cyber Command Were Running An 'Election Special'

Hunt Forward: A special operation against malicious foreign cyber actors to seek out hackers from Russia, China well before the US election.

2020-11-05

Critical Cyber Security Threats & Solutions For Business

Over 45% of UK businesses have been attacked this year and there are some important steps to be taken to prevent disaster striking your company.

2020-11-05

British Military Gets A Defensive Cyber Security Platform

Researchers have shared expertise to enable the cyber security platform to make predictions about the likely next steps of an evolving attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Polyrize

Polyrize

The Polyrize continuous authorization platform for SaaS and IaaS stops tomorrow's public cloud cyber threats, today.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Cado Security

Cado Security

Cado Security is pushing digital forensics, and cyber incident response to the next level with an incident response software platform and specialist consulting services.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Anonomatic

Anonomatic

Anonomatic’s mission is to make data privacy secure, simple and cost effective. We are Data and Privacy Experts who are passionate about helping organizations solve PII compliance.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.

Mimic

Mimic

Mimic’s SaaS platform provides enterprises with detection, deflection, and rapid recovery from ransomware attacks.