News

2021-04-05

Your Employee's Cyber Awareness Is Critical

Organisations need a culture of data security and employees are the caretakers of their own organisation’s most valuable and sensitive data.

2021-04-05

The European Union Adopts A Cyber Security Strategy

An agreed EU framework to defend businesses, organisations and citizens from cyber attacks and to promote secure information systems.

2021-04-05

Employees Hired & Fired By Algorithm

Nothing Personal: AI can be used to improve productivity, but it is already being used to make life-changing decisions about people at work.

2021-04-02

New Digital Qualifications For The British Workforce

Over thirty new digital qualifications in computer science, software deployment, systems infrastructure, cyber security & coding practices.

2021-04-02

China & India In Cyber Conflict

Neighbours: Cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

2021-04-01

How Has A Year Of Pandemic Changed Cyber Security?

Developments that were thought to be three to five years in the future are here now and those advances have a direct impact on cyber security.

2021-03-31

In 2020 40% Of UK Businesses Suffered A Cyber Attack

Two in five businesses (39 per cent) and a quarter of charities (26 per cent) report having cyber security breaches or attacks in the last 12 months.

2021-04-17

Webinar: Building A Security Observability Strategy In AWS

In this webinar, SANS and AWS Marketplace will discuss how to architect a security observability strategy in AWS, with practical guidance and tips.

2021-03-29

Create A Cybersecurity Compliance Plan With These Seven Tips

Creating a cybersecurity compliance plan does not need to be overwhelming. Here are seven tips that will help secure your company. By Lauren Groff.

2021-03-29

CISA, NSA And The Dual Hat

Recent drastic failures in US cybersecurity mean it is now time to end the division beween internal and external security agencies. By Ronald Marks.

2021-03-30

Investigating Fake News With Google, YouTube & Facebook

The big three Social Media chiefs grilled by US politicians over the proliferation of disinformation on the YouTube, Twitter and Facebook platforms.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

BeOne Development

BeOne Development

BeOne Development provide innovative training and learning solutions for information security and compliance.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Identify Security Software

Identify Security Software

Our mission is to bring in a new age of autonomous human authentication in the security and identity space.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Deepnet Security

Deepnet Security

Deepnet Security is a leading security software developer and hardware provider in Multi-Factor Authentication (MFA), Single Sign-On (SSO) and Identity & Access Management (IAM).

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Testhouse Ltd

Testhouse Ltd

Testhouse is a thought leader in the Quality Assurance, software testing and DevOps space. Founded in the year 2000 in London, UK, with a mission to contribute towards a world of high-quality software

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

QEDIT

QEDIT

QEDIT is leading the standardization of Zero-Knowledge Proofs through the ZKProof.org Workshops, and builds production-grade ZKP systems for blockchain.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.