News

2020-09-17

Cyber Security Should Be A Mandatory Requirement

With increasing threats and fewer opportunities to fail, governments must rise to the challenge to protect national security and economic prosperity.

2020-09-17

Latest Cyber Security Threats & Trends: 2020 In Review

What are the key cybersecurity threats and trends that every business needs to understand in 2020 and beyond? By Eddie Segal

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-16

How Do Cyber Criminals Operate?

The sophisticated tactics used by cyber criminals make it extremely difficult for law enforcement to collect evidence, then catch and prosecute them.

2020-09-15

Nation-State Hackers Are Infiltrating The 2020 Election

Microsoft has evidence that nation-state cyber-attacks are targeting individuals & organisations involved in the impending Presidential election.

2020-09-14

Four Essential Questions To Ask A Cybersecurity Expert

Most companies should consider hiring a cybersecurity expert in order to keep their confidential information safe. by Jennifer Bell

2020-09-14

Schoolchildren Are Better At Cyber Security Than Their Teachers

Many teachers believe their pupils have better knowledge of cybersecurity than they do. Half don't think their school has done enough to stay secure.

2020-09-14

Cyber Security Deadline For Mariners

The international deadline to incorporate cyber security into seagoing systems looms, but many questions about training mariners remain.

2020-09-09

British Cyber Security Market 2020

Analysis of the UK cyber security industry, including its size, employment & revenue, reveals that business is booming across all sectors.

2020-09-10

Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Implementing a Risk-Based Vulnerability Management Solution is easier than you think. This Guide from Tenable shows how: Download

2020-09-04

Cyber Security: Take Action

Cyber Resilience: Keeping a business cyber-secure is not an easy option and requires specialist knowledge and analysis. We can help.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

DataPassports

DataPassports

DataPassports is a data-centric security and privacy solution that enforces privacy and security from end-to-end with transparent protection of data at the source.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

Adili Group

Adili Group

Adili Group is a leading pan-African corporate advisory firm. We deliver tailored solutions in regulation and compliance, risk management, and improving business efficiency.