News

2024-08-19

Resilience As Regulation: Preparing For The Impact Of CER

EU Critical Entities Resilience Directive: Along with NIS2, the CER will change the way organisations think about security. By Andrea Monteleone

2024-08-15

Business Identity Theft: Saving The Digital World From Fake Businesses

Protect Your Business From Identity Theft: Discover how to identify fake businesses and safeguard your digital presence today. By Sophie Martin

2024-08-16

Trump Campaign Emails Hacked

Update: Donald Trump’s election campaign claim that its internal communications have been hacked by the Iranian government looks credible.

2024-08-16

EU Regulators Threaten To Prosecute Elon Musk

Illegal Content: The European Union is heading for a confrontation with Elon Musk following his live interview with Donald Trump on X.

2024-08-14

Coming Soon - An AI Cyber Security Code

AI Cyber Security Code Of Practice: A proposed set of guidelines that could become the standard for AI security in Britain & potentially worldwide.

2024-08-13

Venezuela Blocks Access To X

VPN Surge: Venezuela’s government has restricted access to a range of online services in response to civil unrest over disputed election results.

2024-08-13

Hackers Stealing Data Using Cisco Smart Install

CISA Warning: Hackers are exploiting an obsolete Cisco Smart Install feature to get access to sensitive data using readily available protocols.

2024-08-20

Ransomware Attack Trends & The True Costs To Victims [extract]

Ransomware attacks pose significant risks to businesses worldwide, with cyber criminals employing increasingly sophisticated tactics to extort payments.

2024-08-07

The Role of VPNs In The World Of Cybersecurity

Safeguarding Sensitive Information: VPNs offer a layer of protection which helps users to navigate the Internet with greater security and anonymity.

2024-08-12

British Nuclear Plant Has Serious Cyber Security Failures

Multiple investigations revealed staggering vulnerabilities that exposed the operation to a wide range of potentially devastating cyber attacks.

2024-08-12

Microsegmentation In 2024: Trends, Technologies & Best Practices

Enhanced Security: By segmenting the network, security policies can be enforced at more precise levels, making it harder for threats to propagate.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Inky Technology Corp

Inky Technology Corp

Inky® Phish Fence is an email protection gateway that uses sophisticated AI, machine learning and computer vision algorithms to block deep sea phishing attacks that get through every other system.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

Texas Cyber Solutions

Texas Cyber Solutions

Texas Cyber Solutions are elite cybersecurity advisors based in Houston, Texas providing network security solutions, penetration testing, and more.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.