News

2020-08-10

Cyber Security Teams Worry Most About Phishing & Ransomware

Inundated with too many alerts, Cyber Security teams are struggling with a lack of visibility into threats, endpoint devices and access privileges.

2020-08-10

The Effects Of GDPR On EU / US Relations

The attempt by GDPR to extend EU privacy rights to every country receiving EU personal data suggests that privacy standards will be globalised.

2020-08-07

What Is A Cyber Security Audit?

A security audit is a critical component of modern business and its key purpose is to assist in developing a strategy for managing cyber security.

2020-08-06

The Risk Of AI Being Used For Offensive Purposes

Many corporate cyber security teams are reliant upon outdated attack scenarios which are no longer resistant to AI-powered attacks.

2020-08-06

Analysts Detect New Bank Malware

BlackRock is a new form of very sophisticated banking malware that can conceal itself as a genuine app to spy on the network it has infiltrated.

2020-08-05

Cyber Security – Not Just For Data Protection

Hackers are increasingly targeting physical devices and there is new technology under development to make digital chips more resilient.

2020-08-05

Unicorn Hacked By ShinyHunters

The innovative digital bank Dave has suffered a major data breach, exposing the personal information of its 7 million users in hacker forums.

2020-08-04

The Cyber Security Threat From Employees

Human errors are the leading cause of data and security breaches as they are not predicable, whereas computers & technology are predictable.

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

2020-08-04

Secret Brexit Documents Hacked By Russians

Russian hackers stole classified documents relating to US / UK post-Brexit trade talks, which were then used in the 2019 General Election.

2020-08-03

Reducing Exposure To Cyber Attack

Strengthening your organisation's defences is about reducing the attack surface and eliminating insider errors, making it much harder to break in.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

HDI

HDI

HDI is the worldwide professional association and certification body for the technical service and support industry.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Worldline

Worldline

Worldline IIoT solutions allow industrial companies to start their digital transformation journey with industrial level cyber security standards (IEC 62443 ready).

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

NetHope

NetHope

NetHope is a membership-based organization serving the international nonprofit humanitarian, development, and conservation sector through digital transformation.

Slide

Slide

Slide is a modern, security-first Business Continuity & Disaster Recovery (BCDR) company built exclusively for Managed Service Providers.

Greenway Solutions

Greenway Solutions

Greenway Solutions are trusted advisors relied upon by our clients to combat sophisticated adversaries in the fraud and security domain.