News

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-08

Cloud Migration Challenges For Healthcare Organisations

The Coronavirus has forced healthcare organisations to speed up cloud migration, which may actually leave them at a higher level of risk.

2021-02-08

More Critical Problems With SolarWinds

SolarWinds have learned of three more critical vulnerabilities with their software which could allow an attacker to steal their customers' vital data.

2021-02-08

Myanmar’s New Military Rulers Block Facebook

For many of the population social media is their only access to the Internet and Facebook has become a rallying point against the military coup.

2021-02-10

Webinar: Architect a security-driven networking strategy in the AWS Cloud

Learn how to create a security-driven networking strategy for the AWS Cloud - technologies, processes, and policies. Thursday, February 25th

2021-02-05

Bug Bounty & Crowd-Sourced Cyber Security

As the importance of cyber security to the economic survival of companies grows, many more CISOs are turning to ethical hackers for help.

2021-02-05

Amazon Phishing Emails

Beware: An email from Amazon 'Fraud Prevention Support' is most likely the complete opposite of what it appears to be.

2021-02-05

Pro-Active Cyber Protection

Antivirus tools are becoming ineffective against advanced attacks. Moving target endpoint defense technology from Morphisec is a powerful solution.

2021-02-04

Cybersecurity Training: Upskilling Employees Is A Must

Organizations need to be vigilant in raising awareness and train their employees in advanced ways to protect their data. By Myrah Abrar

2021-01-27

Delivery Company Leaked 400m Files

Bykea, a logistics firm operating in Pakistan, has exposed 400 million files via an unsecured server affectng 200GB of critical user data.

2021-02-03

Bezos Resigns As Amazon CEO

The founder of the technology giant which has had such a profound effect on everyday life will step down to spend more time with his space ship.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

QATestLab

QATestLab

QATestLab is a leading International software testing company offering a full range of software testing services including security testing.

Conference-Service

Conference-Service

Conference-Service provides a categorised calendar of conferences and events, including Information Security & Privacy.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

Intraprise Health

Intraprise Health

Intraprise Health is a Certified HITRUST Assessor and award-winning provider of health information security products and services.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Options Technology

Options Technology

Options is a global leader in financial technology, specialising in Capital Markets technology and enterprise-grade solutions.

ScamAdvisor

ScamAdvisor

ScamAdviser helps over 3 million consumers every month to discover if a website is legitimate or a possible scam.

Cloudaeris

Cloudaeris

Cloudaeris is a trusted Microsoft Partner, and we've got what it takes to make your business more efficient and agile.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.

Seasia Infotech

Seasia Infotech

Seasia Infotech is a leader in offering efficient, tailor-made and comprehensive digital transformation services.