News

2022-03-02

The Online Battle In Ukraine

Ukraine's invasion is Europe's first experience of conflict in the digital age. Social media, the Internet & Telecoms networks have been weaponised.

2022-03-01

Toyota Shut Down Japanese Plants In A Supply Chain Attack

Toyota's car manufacturing operations shutdown by “system failures at a domestic supplier” resulting from a targeted supply chain attack.

2022-02-28

Russian Cyber Crime Group Issues A Warning

Conti, a powerful cyber crime group, has announced “full support” for the Russian government and will attack opponents of the Ukraine invasion.

2022-03-15

Using Social Media To Track The Pandemic

Using historic data to predict future behaviour is very problematic, not least because humans, like the coronavirus, are capable of mutation.

2022-03-07

Russia's Top Spy Agency Runs Fake News At Home

The GRU military intelligence agency is behind many effective domestic online operations and is probably Russia's most capable spy agency.

2022-02-25

The Frailty Of Email

Education Is Critical: Email is a key component in doing business but it is aso a common carrier of malicious content. By Colin Tankard

2022-03-03

British Schools At Risk Of Cyber Attacks

Three quarters of Head Teachers believe their school faces an increased risk of being exposed to a cyber incident because of remote learning.

2022-02-28

Russian Hackers Account For 74% Of Ransomware Proceeds

Over $400 million worth of crypto currency ransom payments made by victims went to groups "highly likely to be affiliated with Russia".

2022-02-25

Drawbridge Wins ‘Best Cyber Security Solution’

Drawbridge has been selected as ‘Best Cyber-Security Solution’ at the Intelligence HFM US Quant Services Awards 2022.

2022-02-25

Lithuania & Poland Issue Cyber Attack Warnings

Ukraine Invasion: Lithuania and Poland warn their organisations to be prepared for attacks on critical  infrastructure and communications networks.

2022-02-23

Protect Your Organisation - Know Your Enemy

Being able to identify, protect, detect, respond to and recover from threats is vital. Know your enemy, your battlefield & yourself. By Ryan Weeks

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Centre for the Protection of National Infrastructure (CPNI) - UK

Centre for the Protection of National Infrastructure (CPNI) - UK

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

R2S Technologies

R2S Technologies

R2S can help you implement a cyber security framework to ensure your business is more resilient towards the growing threat of cyber crime. We provide Web and Mobile Application Security Assessment..

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Nubeva Technologies

Nubeva Technologies

Nubeva provide a breakthrough TLS Decrypt solution with Symmetric Key Intercept to gain the visibility needed to monitor and secure network traffic.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Positiwise Software Pvt Ltd

Positiwise Software Pvt Ltd

Positiwise Software offers end-to-end software development solutions to accelerate the digital growth of businesses.

Center for Cyber Security Studies & Research (CFCS2R)

Center for Cyber Security Studies & Research (CFCS2R)

CFCS2R's mission is to empower individuals, organizations, and governments with the knowledge and tools necessary to protect against cyber threats.

Motive Managed Services

Motive Managed Services

Motive Managed Services take the complexity out of IT, Cybersecurity, and Network Operations, so you can focus on growing your business.