News

2017-05-25

Directors Report June 2017: Cloud Security Analysed For Management (£)

With multiple cloud services, many companies are losing track of their data.

2017-05-24

What We Know About The WannaCry Cyberattack So Far

The attack has served as a live demonstration of a new type of global threat, one that could encourage future hackers.

2017-05-23

Trump Signs Cybersecurity Order

Three Components: Protecting federal networks, cybersecurity of critical infrastructure and promoting cyber-security workforce development.

2017-05-25

Cyber Crime Drives Up The Cost Of Insurance

Insurers see coverage against hackers as one of their most promising markets, estimating that premiums will triple over the next four years.

2017-05-24

Industrial Robots Are A Security Weak Link

Web-connected industrial robots used in factories and logistics are insecure, leaving companies wide open to cyber attacks & costly damages.

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-05-23

US Reduces Crime Rates Using Effective IT

Crime has fallen dramatically over the past 20 years, primarily due to the technological changes which have made it harder to commit crime.

2017-05-22

WannaCry Attack Is A Big Wake-Up Call

The ransomware attack highlights a dependence on interconnected technology & the massive challenge to secure the software systems we rely on.

2017-05-22

Hackers Came, But the French Were Prepared

President Macron's campaign team thwarted Russian hackers, showing a level of ingenuity missing in Hillary Clinton’s failed presidential campaign.

2017-05-16

What Every CISO Needs To Know

Enterprises are under an endless stream of cyber attacks. The sophistication of these attacks is evolving and prioritization is essential.

2017-05-16

Microsoft, Kaspersky & Symnantec Weigh In On WannaCry Ransomware

Top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean Cybergang known as Lazarus Group.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Radisys

Radisys

Radisys offers software, products, integrated systems, and professional services for communication service providers and telecom solution vendors.

Simula Research Laboratory

Simula Research Laboratory

Simula Research Laboratory carries out research in the fields of communication systems, scientific computing and software engineering.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

Immersive

Immersive

Immersive unifies Cyber Drills, Exercises, Sims, Ranges, and Training into one single, adaptive platform. One Platform. Total Cyber Resilience.

Spherical Defense

Spherical Defense

Spherical Defense offers an alternative approach to WAFs and first generation API security tools.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

CloudSEK

CloudSEK

CloudSEK has set its sights on building the world’s fastest and most reliable AI technology, that identifies and resolves digital threats.

Data Privacy Office (DPO) - Belarus

Data Privacy Office (DPO) - Belarus

Data Privacy Office is a company that specializes in privacy and personal data protection, following the highest standards in its sector.

National Cryptologic Foundation (NCF) - USA

National Cryptologic Foundation (NCF) - USA

The National Cryptologic Foundation strives to influence the cryptologic future by sharing our educational resources, stimulating new knowledge, and commemorating our heritage.

PKI Solutions

PKI Solutions

PKI Solutions offers Public Key Infrastructure (PKI) products, services, and training to help ensure the security of organizations now and in the future.

Druva

Druva

Druva is the industry’s leading SaaS platform for data resiliency, and the only vendor to ensure data protection across the most common data risks backed by a $10m guarantee.

Inholo

Inholo

Inholo offers tools to manage the risks of synthetic realities, starting with an AI-photo detection service.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.