News

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

2022-09-14

India's Health Systems Are A Top Target

Rapid digitisation of the Indian healthcare sector was driven by Coronavirus, but it has left numerous vulnerabilities that are now being exploited.

2022-09-13

New Cyber Security Laws For Telecoms Providers

Britain’s telecoms industry is getting new security regulations, with data protection requirements that will be among the strongest in the world.

2022-09-13

Evil Has New Cyber Weapons

TeslaGun: The Evil Corp ransomware gang, best known for Dridex banking malware, has expanded its cyber weapons arsenal to include cryptomining.

2022-09-12

US Tech Firms Forbidden To Manufacture In China

Technology firms that have had US federal funding will be prevented from creating advanced technology factories in China for at least a decade.

2022-09-12

Japan’s Government Websites Come Under Attack

Killnet Strike Again: A series of large-scale DDoS attacks against Japanese companies affecting twenty websites across four government ministries.

2022-09-12

The Top 4 Cyber Threats - Is Your Business Protected?

Is it possible for businesses to really be protected? Absolutely – if organisations give cyber security the attention it deserves. By Keiron Holyome

2022-09-12

Cyber Crime Against Individuals

It's Personal: Cyber crime continues to rise in scale and complexity, affecting essential services & businesses, as well as many private individuals.

2022-09-09

(ISC)² Makes Cyber Security Careers More Widely Accessible

Achieving Career Goals: (ISC)² Candidates is an innovative new professional development path for individuals seeking a career in cyber security.

2022-09-08

Locking Down Cyber Security

Managing The Basics: Educating employees and partnering with the right cyber security technology providers will empower them to lock criminals out.

2022-09-07

The Quantum Internet Could Be Immune To Cyber Attack

Researchers at Eindhoven University of Technology are developing technology capable of delivering a fast and unhackable quantum Internet. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

Trapp Technology

Trapp Technology

Trapp Technology combines the very best cloud, Internet, IT managed services, and IT consulting to provide a true all-in-one IT solution for small to mid-sized businesses.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

PagerDuty

PagerDuty

PagerDuty is the central nervous system for a company’s digital operations. We identify issues in real-time and bring together the right people to respond to problems faster.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

Merlin Ventures

Merlin Ventures

Merlin Ventures is a strategic investor focused on driving growth and value for cybersecurity software companies with market-leading potential.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.