News

2021-12-13

Critical Fault with Log4j Software

Alert: Attackers are exploiting a critical vulnerability in Apache Log4j, a logging library that's used in millions of Java-based applications.

2021-12-10

Britain's New Deals On Digital Trade & Cyber Security

Britain has entered separate new long term cyber security arrangements with Israel and Singapore to frame new technology & future digital standards.

2021-12-10

Boris Johnson's Cabinet Office Fined £500k For Leaking Data

The British Government department responsible for supporting Prime Minister Boris Johnson pays the penalty for breaking GDPR rules.

2021-12-31

Cyber Security In 2022

Strategic & Tactical predictions for the digital ecosystem, which faces even more challenges & numerous sophisticated threats in 2022. By Chuck Brooks

2021-12-08

How Good Is Your Resilience Testing?

Backup: Any resilience measure must be tested on a regular basis, and not just when the ‘stuff’ has hit the fan. By Colin Tankard

2021-12-08

Amazon Cloud Outage Affects Major Customers

The extent to which major companies in retail, media, logistics, financial & other critical services rely on the outsourced cloud provider is exposed.

2021-12-07

Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts in an effort to limit the influence of manipulation and disinformation operations on the platform.

2021-12-07

Multiple Location Supermarket Suffers Supply Chain Attack

Total IT Outage: 300 Spar convenience stores in the UK have been knocked offline, unable to process card payments as their IT supplier is attacked.

2021-12-07

Cyber Attacks Should Be The #1 Concern For Business Leaders

Prevention Is The Priority: Over 80% of board directors surveyed identified cyber attacks as the biggest threat that their business currently faces.

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

2021-12-06

NSO Spyware Used To Hack The State Department

NSO Group’s spyware has been used by an unknown assailant to hack the mobile phones of at least nine United States State Department employees.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Sanderson Recruitment

Sanderson Recruitment

Sanderson is a recruitment company providing expert recruitment services in areas including Cyber & Information Security.

Cryptika

Cryptika

Cryptika is a fully integrated IT security and managed services provider, specialized in Next-Generation Cyber Security Technologies.

Vumetric Cybersecurity

Vumetric Cybersecurity

Vumetric is an ISO9001 certified company offering penetration testing, IT security audits and specialized cybersecurity services.

Sixteenth Air Force (Air Forces Cyber) - USA

Sixteenth Air Force (Air Forces Cyber) - USA

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Legit Security

Legit Security

Legit Security's mission is to secure every organization's software factory by protecting the pipelines, infrastructure, code and people for faster and more secure software releases.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.