News

2020-11-16

Cyber Psychology

The Human Factor: A resilient cyber security strategy takes individual personalities into account, just as much as software and systems.

2020-11-16

Using Artificial Intelligence In Business

AI has become a key component in cyber security infrastructure for every business, providing a sophisticated, multi-layered security strategy.

2020-11-13

N. Korean Hacking Group Has New Malware

Kimusky hackers are using new malware to drive information-stealing attacks against COVID-19 vaccine makers and other critical targets.

2020-11-13

Game-Changing Cyber Security Technology

Using iOS, Android and Microsoft apps, Keyavi can protect data files with multi-layered intelligence, self-protection & self-aware security.

2020-11-12

The Market For Remote Desktop Software Is Set To Boom

Coronavirus is driving the demand for remote desktop software as organisations adopt remote working to maintain their day-to-day operations.

2020-11-11

Russian Turla Hackers Specialise In Attacking Government Agencies

US Cyber Command has exposed several new malware samples developed and deployed by Russian hackers to attack government agencies.

2020-11-11

The Five Best Ways To Secure Your Cloud Environment

Cloud migration is almost complete for many businesses. Unfortunately, cloud account breaches are increasing. What's to be done? By Mina Khaki

2020-11-10

Cyber Security For SMEs

It's Not Only Big Businesses: According to the insurance industry, one SME in the UK suffers from a cyber attack every 19 seconds.

2020-11-10

Fake News Is A Big Problem For CISOs

Beware: Fake News, Misinformation and Disinformation campaigns are just as bad for businesses as they are democratic elections.

2020-11-09

Taiwan Company Guilty Of Semiconductor IP Theft

Trade Secrets: A Taiwan chip manufacturer conspired with China to steal critical technology from a US semiconductor design company.

2020-11-09

Criminals Have Ramped Up Covid-19 Related Attacks

Over 25% of the cyber attacks that were dealt with by the British NCSC over the past 12 months were Covid-related.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

AMETIC

AMETIC

AMETIC, is the Association of Electronics, Information and Communications Technologies, Telecommunications and Digital Content Companies in Spain.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

AXA XL

AXA XL

AXA XL is the P&C and Specialty Risk Division of AXA. Professional insurance products include Cyber Insurance.

GreenWorld Technologies

GreenWorld Technologies

GreenWorld has a proven track record in industry leading IT asset management, secure data destruction and remarketing.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.