News

2020-09-22

Find Yourself In The Mind Of An Attacker!

Now in CYRIN's new Packet Capture Analysis exercise lab, see how to use the advanced Filtering and Analysis capabilities of Wireshark.

2020-09-22

Exaggerating Cyber Threats Undermines Policy Making

Ex-NCSC chief says that predictions of catastrophic consequences for governments & business of a major cyber attack are counter-productive.

2020-09-21

British Universities Shut Down By Cyber Attacks

Britain's Northumbria University, which offers a prestigious Cyber Security Masters Programme, has been the target of a damaging cyberattack.

2020-09-21

Foreign Influence In The American Election Of 2020 Is Declining

A long-serving CIA official and distinguished expert on cybersecurity says that there will be less interference in the 2020 election than 2016.

2020-09-21

A Hospital Hack Caused A Patient To Die

Medical staff believe a woman died from the delay in treatment after hackers attacked a German hospital’s computer system with ransomware

2020-09-17

Cyber Security Should Be A Mandatory Requirement

With increasing threats and fewer opportunities to fail, governments must rise to the challenge to protect national security and economic prosperity.

2020-09-17

Latest Cyber Security Threats & Trends: 2020 In Review

What are the key cybersecurity threats and trends that every business needs to understand in 2020 and beyond? By Eddie Segal

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-16

How Do Cyber Criminals Operate?

The sophisticated tactics used by cyber criminals make it extremely difficult for law enforcement to collect evidence, then catch and prosecute them.

2020-09-15

Nation-State Hackers Are Infiltrating The 2020 Election

Microsoft has evidence that nation-state cyber-attacks are targeting individuals & organisations involved in the impending Presidential election.

2020-09-14

Four Essential Questions To Ask A Cybersecurity Expert

Most companies should consider hiring a cybersecurity expert in order to keep their confidential information safe. by Jennifer Bell

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigiCert

DigiCert

DigiCert is the only provider of enterprise-grade SSL, IoT and PKI solutions. Our certificates are trusted everywhere, millions of times every day, by companies across the globe.

MyCERT

MyCERT

MyCERT is the National Computer Emergency Response Team of Malaysia.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

German Israeli Partnership Accelerator (GIPA)

German Israeli Partnership Accelerator (GIPA)

GIPA is based on two pillars: it is an incubator aimed at young academics and a program to transfer cybersecurity expertise to corporate partners.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Ethyca

Ethyca

Ethyca builds automated data privacy infrastructure and tools for developers and privacy teams to easily build products that comply with GDPR, CCPA Privacy Regulations.

Sentor Managed Security Services

Sentor Managed Security Services

Sentor Managed Security Services is a cybersecurity company that enables organizations to exist in a digitally connected world.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

UberEther

UberEther

UberEther are a dedicated group of software developers and consultants developing and deploying the next generation of identity management and cloud solutions.