News

2020-04-01

Beware Spoofing Attacks

Spoofing Is No Joke: Eleven types of spoofing attack that every security professional should know about. By David Balaban

2020-04-03

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 | Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

2020-03-31

Stay Cyber-Secure Working From Home

People working from home are a lot more vulnerable than inside a secure office environment - Here is advice for workers and their employers.

2020-04-03

Universities That Teach Cyber Security At Risk

Leading universities in Britain and the US that teach and research Cyber Security are finding that they are themselves subject to a range of attacks.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

2020-03-31

The US Is Facing A Catastrophic Cyber Attack

The US is “dangerously insecure in cyber,” and needs to take a series of actions to avert attacks on critical infrastructure & financial services.

2020-04-06

Container Shipping Gets A Cyber Security Mandate

Detailed guidance is released to ship-owners and sea-going vessels to get them ready for new international maritime cyber security rules.

2020-04-03

Wikileaks Alerted Hackers To CyberCom

US Cyber Command accuses Wikileaks of revealing operational security changes that could assist malicious nation-state hacking groups.

2020-04-07

Cloud Has Become A Business Essential

Cloud Services is a robust industry that has quickly become mainstream, offering powerful capabilities once simply unavailable to smaller companies.

2020-03-31

The EU Power Grid Is Under Attack

The organisation responsible for coordinating EU electricity markets has disclosed its IT network has been compromised in a “cyber intrusion.”

2020-04-08

Too Few Women In Tech Jobs

Being an InfoTech woman in a male-dominated industry has its obstacles. Here are some best practices recommended by female developers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Dynatrace

Dynatrace

Dynatrace provides software intelligence to simplify cloud complexity and accelerate digital transformation.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Francisco Partners

Francisco Partners

Francisco Partners provide capital, expertise, and support for growth-aspiring technology companies.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

Teal

Teal

Teal provides exceptional managed IT solutions for small- to medium-sized organizations that value real partnerships and elevated security.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.