News

2020-08-17

NSA And FBI Warn Of Russian Linux Malware

Drovorub malware is a full-featured piece of Linux malware to infiltrate networks, steal confidential information and execute malicious commands.

2020-08-19

The Rise of the Business-Aligned Security Executive

Is your security operation aligned with the goals of the business? Learn how CISOs can reduce cyber risk while powering innovation. Download the Study.

2020-08-17

The Digital Revolution Is Evolving

New technologies, growing amounts of data and smarter ways of getting insights are changing the way people, businesses & governments interact.

2020-08-14

Belarus Government Shut Off The Internet During Elections

Election Day: Belarusians experienced Internet blackouts and major social networks, instant messengers & search engines were inaccessible.

2020-08-14

Cybercrime In Britain Does Serious Harm

Cyber crime covers a wide range of different offences, all of which are punishable by law in the UK. Be vigilant and avoid becoming a victim.

2020-08-17

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Explore how security teams can leverage solutions to create visibility at scale allowing you to do more with your data & improve your security posture.

2020-08-14

Google Bans Ads Linking To Hacked Political Content

Google will block advertising that contains hacked political content in an effort to prevent major interference in the 2020 US Presidential election.

2020-08-14

Essential Books For Learning About Cyber Security

Reading List: Get clued up to make sure you have the technical skills to find the areas of vulnerability and avoid cyber security disasters.

2020-08-12

Australia's Cyber Security Plan Includes Domestic Surveillance

Australia plans to provide the ADS spy agency with new powers that will allow it to conduct domestic investigations for the first time.

2020-08-11

Which Industries Suffer Most From Remote Working?

Cybercrime threat rates by sector since lockdown vary significanty and some sectors have experienced a big increases in their threat levels.

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 5,000+ specialist service providers.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

JPCERT/CC

JPCERT/CC

JPCERT/CC is the first Computer Security Incident Response Team (CSIRT) established in Japan.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

National CyberWatch Center

National CyberWatch Center

National CyberWatch Center is a cybersecurity consortium working to advance cybersecurity education and strengthen the national workforce.

Security In Motion

Security In Motion

Security in Motion is an independent provider of IT security and infrastructure services, supplying the SME and enterprise markets.