News

2019-01-18

Russia Supported Trump Election Campaign

US Senate says Russia engaged in a coordinated campaign to get Donald Trump elected and US technology companies were central to its strategy.

2019-01-14

Blackout On The Dark Web

Mysterious hackers penetrated a popular dark web server and then permanently deleted more than 6,500 secret websites.

2019-01-11

UK Launches Long-Awaited Cyber Skills Strategy

A new UK cybersecurity skills strategy designed to reduce industry shortages and a new independent body to help shape the future of the profession.

2019-01-14

Protecting Your Company’s Data Against Insider Threats

While breaches affecting large organisations get the most publicity, the truth is that no business is immune from the danger of insider threats.

2019-01-11

Breaking Down Five 2018 Breaches

Data breaches soared in 2018. This might be that since GDPR came into force firms are more likely to report attacks. It does not mean they are safer.

2019-01-14

Payment Accepted Emails – Don't Click

The email is not a genuine order notification. Instead, it is a ruse designed to trick you into downloading malware.

2019-01-09

NASA Discloses A Data Breach

NASA has admitted recently to getting hacked in 2018 although they say they still dont know the number employees affected.

2019-01-02

US Treasury Sanctions Russians For Electoral Interference

The US government isn't done taking action against Russians accused of hacking and interference campaigns.

2019-01-11

Cybercrime Gangs Continue To Innovate

Phishers are using new techniques to carry out their attacks, and obscure their origins, to make the most of every criminal campaign.

2019-01-10

Fortnite Teen Hackers 'Earning Thousands of Pounds a Week'

Children as young as 14 are making thousands of pounds a week as part of a global hacking network built around the popular video game Fortnite.

2019-01-09

Quantum Computing – Advantage Or Security Threat?

Some US government agencies see quantum computing and artificial intelligence as potential near-term security threats.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TNO Cyber Security Lab

TNO Cyber Security Lab

TNO Cyber Security Lab is a dedicated facility for innovative and experimental research with the goal of a safe and resilient cyberspace.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

Direct Recruiters Inc

Direct Recruiters Inc

Direct Recruiters is a relationship-focused search firm that assists IT Security and Cybersecurity companies with recruiting high-impact talent.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

blueAllianceIT

blueAllianceIT

blueAlliance IT is an investment and growth platform that unites local MSP and IT companies around the nation, helping them to grow and operate competitively.

SecureClaw

SecureClaw

SecureClaw offers specialized cybersecurity consultation, various products, and a range of services to meet your company's business domain needs.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

Lasso Security

Lasso Security

Lasso Security is a pioneer cybersecurity company ensuring comprehensive protection for businesses leveraging generative AI and other large language model technologies.

Fairly AI

Fairly AI

Fairly AI is on a mission to democratize safe, secure, and compliant AI across the enterprise.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

DATS Project

DATS Project

DATS Project enables the utilization of high computing power across a number of cybersecurity services, all on a pay-as-you-go basis, eliminating the need for upfront investment costs.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.