News

2021-02-16

If Hackers Are At The Door – Can You Defend Yourself?

Ransomware, Man-in-the-Middle, SolarWinds - Are you safe? Are hackers inside? - Defend yourself with one of CYRIN’s new training packages.

2021-01-28

SANS Institute book: Practical guide to security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

2021-01-26

Google is Offering $3m To Fact-Check Vaccine Fake News

Google's News Initiative offers to pay $3m to fact checking organisations with the aim to reduce fake news & disinformation about Covid-19 vaccines.

2021-01-26

Financial Organisations Are Migrating To The Cloud

Financial services organisations are planning to optimise their cloud usage with investments in the hybrid cloud expected to grow significantly.

2021-01-26

Crypto Currency Users Hijacked

ElectroRAT is an unusual new malware specially created to target cryptocurrency users with trojan apps that log keystrokes and execute commands.

2021-01-25

Biden Twitter Account Starts With Zero Followers

Almost as if they are trying to antagonise the new President, Twitter made Joe Biden open his new Presidential account without any followers.

2021-01-25

Warning: Ransomware Attacks On Virtual Classrooms

The FBI and NCSC are warning of increased attacks against schools and colleges which are more exposed by the move to distance learning.

2021-01-25

Cyber Security Is The CEO’s Biggest Problem

Survey: Cyber security continues to be the top concern of business leaders and is the area where leaders feel their knowledge is most lacking.

2021-01-22

Cyber Security Certifications - Online Exam

The association of certified cyber security professionals (ISC)² is offering online supervised pilot tests for certification, including CISSP.

2021-01-21

Social Media Has Been Weaponised

The weaponisation of social media has turned armed conflict, technology and politics into a battle space playing out on our smartphones.

2021-01-16

Airline Faces £800m Penalty For Customer Data Breach

A British High Court ruling means that 400,000 British Airways customers can claim compensation after hackers skipped though its network security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SafeUM Communications

SafeUM Communications

SafeUM Secure Messenger is an encrypted secure communications protection mechanism for instant messaging.

Kount

Kount

Kount's “decision engine” platform is ideal for managing fraud in online/telephone channels that process payments and onboard new customers.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Identity Management Institute (IMI)

Identity Management Institute (IMI)

Identity Management Institute (IMI) provides professional training and certification in cyber security with a focus on identity and access management, identity theft, and data protection.

SecurityStudio

SecurityStudio

SecurityStudio is a continuous cybersecurity risk management platform that allows decision-makers to quickly identify the most immediate threats and make confident risk informed decisions.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Tyto Athene

Tyto Athene

At Tyto Athene, we harness the power of technology to provide solutions that shape the future.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.