News

2020-02-21

Trends In Cyber Security Technology

Security teams struggle to make sense of a flood of data while simultaneously prioritising and responding to alerts. They need a lot more help.

2020-02-20

Charming Kittens: Phishing Emails From Iran

Iran-linked hackers called "Charming Kitten" are targeting journalists & human rights campaigners by attempting to take over their email accounts.

2020-02-19

The Cloud Is Beginning To Attract Criminal Extortion

Mistakes made while setting up cloud permissions and policies create weak spots that attackers can exploit to deliver ransomware.

2020-02-19

Counting The Ways That AI Can Boost Business

Business leaders are growing more enthusiastic about using Artificial Intelligence to increase the speed and capabilities of their enterprise.

2020-02-20

The New Wave Of Attack Vectors

Be Prepared: As cyber attacks grow constantly more sophisticated, top industry experts describe the latest wave of attack vectors to look out for.

2020-02-18

Top Australian Spy Condemns Britain's Huawei Decision

The outgoing Head of the Australian Signals Directorate spy agency says that Britain is mistaken to think it can trust Huawei's 5G network.

2020-02-17

Fake News And The 2020 Presidential Election

American voters report a high level of concern about how secure the 2020 presidential election will be and worry about the perils of disinformation.

2020-02-17

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured

Surveys suggest that cyber threats are top of the most pressing risks facing UK businesses leaders, yet less than 20% have a cyber insurance policy.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2020-02-17

GDPR's Impact In The US And Globally

Outside of the European Union you might think that it doesn’t apply to you, but GDPR affects organisations and businesses worldwide.

2020-02-17

The Human Effect On AI Security

Although innovations in ArtificiaI Intelligence are transforming cybersecurity, the key high level aspects remain essentially human.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Firebrand Training

Firebrand Training

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

AnubisNetworks

AnubisNetworks

AnubisNetworks is one of Europe’s leading threat intelligence and email security suppliers.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Sify Technologies

Sify Technologies

Sify is the largest ICT service provider, systems integrator, and all-in-one network solutions company on the Indian subcontinent.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.

Wirespeed

Wirespeed

Managed Detection & Response (MDR) has never been faster or easier: Onboard in minutes, Respond in seconds, Secure instantly.

Visernic

Visernic

VISERNIC is a cyber security firm with a team of certified security experts dedicated to protecting organizations from evolving cyber threats.