News

2021-02-10

Webinar: Architect a security-driven networking strategy in the AWS Cloud

Learn how to create a security-driven networking strategy for the AWS Cloud - technologies, processes, and policies. Thursday, February 25th

2021-02-05

Bug Bounty & Crowd-Sourced Cyber Security

As the importance of cyber security to the economic survival of companies grows, many more CISOs are turning to ethical hackers for help.

2021-02-05

Amazon Phishing Emails

Beware: An email from Amazon 'Fraud Prevention Support' is most likely the complete opposite of what it appears to be.

2021-02-05

Pro-Active Cyber Protection

Antivirus tools are becoming ineffective against advanced attacks. Moving target endpoint defense technology from Morphisec is a powerful solution.

2021-02-04

Cybersecurity Training: Upskilling Employees Is A Must

Organizations need to be vigilant in raising awareness and train their employees in advanced ways to protect their data. By Myrah Abrar

2021-01-27

Delivery Company Leaked 400m Files

Bykea, a logistics firm operating in Pakistan, has exposed 400 million files via an unsecured server affectng 200GB of critical user data.

2021-02-03

Bezos Resigns As Amazon CEO

The founder of the technology giant which has had such a profound effect on everyday life will step down to spend more time with his space ship.

2021-02-03

Enemy Action - The Distinctive Features Of Cyber Warfare

Operating behind false IP addresses, foreign servers and aliases, attackers can act with almost complete anonymity and relative impunity.

2021-02-02

Google Threatens To Leave Australia

Australia is introducing legislation to require Google, Facebook and other social media companies pay for their local news content.

2021-02-01

Become a Robot & Live Forever

According to a futurologist, by 2050 humans will be able to integrate their brain with computers which might then be encased in a humanoid robot.

2021-02-01

5G Could Be A Cyber Security Revolution

Organisations implementing new security measures using 5G architecture are in the best position to protect themselves from being targeted.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Redspin

Redspin

Redspin provide penetration testing, security assessments and consulting services.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

ITRenew

ITRenew

ITRenew is a leading global IT lifecycle management solutions company, specializing in onsite data center decommissioning and data erasure services.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Authomize

Authomize

Authomize aggregates identities and authorization mechanisms from any applications around your hybrid environment into one unified platform so you can easily and rapidly manage and secure all users.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

Microminder Cyber Security

Microminder Cyber Security

Microminder Cyber Security are innovators, advisors, strategists committed to solving your cyber security challenges.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

Interpres Security

Interpres Security

Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure.

Federal Office for the Protection of the Constitution (BfV)- Germany

Federal Office for the Protection of the Constitution (BfV)- Germany

The Federal Office for the Protection of the Constitution (Bundesamt für Verfassungsschutz - BfV) is the domestic intelligence services of the federal government of Germany.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.

Quantonation

Quantonation

Quantonation is a global early-stage venture capital fund investing in breakthrough technologies based on advances in physics and computing.