News

2020-11-21

Remote Working: Five Best Ways To Prevent A Data Breach

Remote teams play a critical role in the success of many companies and business leaders must be mindful of the underlying risk of data breaches.

2020-11-20

Why Real-Time Data Matters To The Maritime Industry

Maritime companies are using Big Data tools and Cloud-based sytems to drive operational efficiency. Keeping the data secure is a big issue.

2020-11-23

SANS Book: Practical Guide to Security in the AWS Cloud

SANS' Practical Guide to Security in the AWS Cloud. Tactics, techniques and procedures for securely operating in the cloud. Download Now

2020-11-19

CYRIN Cyber Alert - Test-Drive The CYRIN Cyber Range

Real Tools, Real Attacks and Real Scenarios that provides hands-on training and experience for IT Engineers and Cyber Security Defenders.

2020-11-18

Cyber Criminals Are Banking On Black Friday

Cyber criminals are aiming to profit from stealing payment card data and personal details that will be flowing over online networks faster than ever.

2020-11-18

Trump Fires National Cyber Security Chief

Donald Trump has fired the Director of CISA for saying the 2020 Presidential elections were not rigged with no evidence of interference or fraud .

2020-11-17

Ten Security Tips To Protect Your Website From Hacking

Website security is vital and every website needs to be protected, regardless of the industry in which the site operates. By Vitaly Kuprenko

2020-11-20

Cyber Security Training For Employees

Employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces. They need training.

2020-11-23

Why Do People Become Cyber Criminals?

Cyber criminals exploit human or other security vulnerabilities to steal passwords, data or money. Some of them are motivated by a desire for fame.

2020-11-23

Artificial Intelligence In The Cyber Security Market

AI can bring instant insights and faster response times to cyber threats and the market is forecast to generate $100billion in revenue by 2030.

2020-11-23

GCHQ Launches War Against Coronavirus Vaccine Fake News

The British spy agency is using techniques developed to eliminate terrorist propaganda to prevent malicious anti-vaccine disinformation.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

C3.ai

C3.ai

The C3 AI Suite supports configurable, pre-built, high value AI applications for predictive maintenance, fraud detection, anti-money laundering, sensor network health and more.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Nu Quantum

Nu Quantum

Nu Quantum is developing quantum photonics hardware to power the quantum revolution in communications, sensing and computing.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency (CIA) - USA

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Attestiv

Attestiv

Attestiv puts authenticity into photos, videos and documents by utilizing advanced technologies in AI and tamper-proofing.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.