News

2020-10-30

Five Things Management Must Know About Cyber Security

Cyber threats advance more quickly than many organisations can keep up with. It has never been more important for business leaders to take action.

2020-10-30

Nearly Half Of All Businesses Have No Protection

Two new pieces of research confirm the shocking levels of ignorance and complacency which leave so many business exposed to cyber attack.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-28

Ireland's Privacy Regulator Is Investigating Instagram

Facebook could get a huge EU fine after the Irish Data Protection Commission investigation of how Instagram handles childrens' contact data.

2020-10-28

Malware Versus Ransomware: What’s the Difference?

The decision to pay a ransom demand should not be taken lightly. If you do decide to pay, there are some things you should know. By Harman Singh

2020-10-27

Anticipating Cyber Attacks

Cyber security teams need to shift their focus inside the network and implement tools that help detect cyber attacks as early as possible.

2020-10-27

Russia's Hackers Are Masters Of Cyber Warfare

The British and US indictments of the 'Sandworm' group of military hackers reveals the extensive reach and power of professional cyber soldiers.

2020-10-27

Big Regulatory Changes In Store For The Internet

The US and the EU intend to bring in heavy regulation of tech markets which will have long term consequences for how the internet operates.

2020-10-26

The Big US Tech Corporations Are A ‘Monopoly of Power’

US Legislators are advocating massive changes that would lead to the regulatory disintegration of some of largest US tech companies.

2020-10-26

AI Is Evolving Into A Business Necessity

The transformative power of AI is affecting all aspecta of business, management, operations, people & culture. Including cyber security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

Aptible

Aptible

Aptible is a Platform as a Service (PaaS) that gives startups everything developers need to launch and scale apps and databases that are secure, reliable, and compliant.

Clari5

Clari5

Clari5 redefines real-time, cross channel banking Enterprise Fraud Management using a central nervous system approach to fight financial crime.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Information Systems Security Association (ISSA)

Information Systems Security Association (ISSA)

ISSA is the community of choice for international cybersecurity professionals dedicated to advancing individual growth, managing technology risk and protecting critical information and infrastructure.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

MirrorTab

MirrorTab

MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware.