News

2021-08-26

Webinar: Adapting detection and response strategies to the cloud

Thursday, September 9th | AWS Marketplace webinar: Adapting detection and response strategies to the cloud | Live Regional Versions

2021-08-23

Seven Ways That Social Media Sabotages Cyber Security

Warning: Having a social media webpage affects your cyber security. Although social media can do a lot for you, it can also take a lot away from you.

2021-08-23

T-Mobile Customers Affected By Massive Breach

T-Mobile has admitted to a sophisticated attack and now the stolen personal data of as many as 54 million US customers could be up for sale.

2021-08-23

US State Department Under Attack

The US State Department which handles America's foreign relations has disclosed it has been the victim of a mysterious attack by persons unknown.

2021-08-20

Hackers Give Back Half Of $600m In Stolen Crypto Currencies

Hackers who stole $600 million in crypto currencies from PolyNet have returned half the money. It is still the most costly hack in history.

2021-08-20

Vaccine Passport Scams

Action Fraud: Britain's online crime reporting portal has issued a warning about fake National Health Service emails offering a 'Vaccine Passport".

2021-08-19

Cyber Insurance: What to Expect In the Next 5 Years

Sustained market growth, increased regulation, consolidation & standardisation are the key trends to look out for in cyber insurance. By Eliza Sadler

2021-08-19

Internet of Things (IoT) Review

The IoT is a system of inter-related computing devices, mechanical and digital machines, each one able to transfer data over the internet. (£)

2021-08-19

eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

2021-08-18

Facebook Bans The Taliban

The Taliban presents a fresh challenge for social media companies over content created by the Islamic group, considered by many to be terrorists.

2021-08-18

The Taliban's Mastery Of Information Warfare

The Taliban have used modern information warfare techniques, combining fake accounts and bots, to successfully undermine the Afghan government.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Key Cyber Solutions

Key Cyber Solutions

Key Cyber is an IT consulting firm that specializes in agile software development services, program management and infrastructure services, cyber security and cloud and managed services.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Pathlock

Pathlock

Pathlock (formerly Greenlight) help enterprises and organizations automate the enforcement of any process, access, or IT general control, for any business application.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

Focus Digitech

Focus Digitech

Focus Digitech helps you with your digital transformation journey with our main core offerings of Cloud, Cybersecurity, Analytics and DevOps.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.

Oktacron

Oktacron

Oktacron is a company specialized in cybersecurity, guided by the principle that at every moment, in every approach, and with all technologies, one should stay one step ahead of attackers.