News

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-16

How Do Cyber Criminals Operate?

The sophisticated tactics used by cyber criminals make it extremely difficult for law enforcement to collect evidence, then catch and prosecute them.

2020-09-15

Nation-State Hackers Are Infiltrating The 2020 Election

Microsoft has evidence that nation-state cyber-attacks are targeting individuals & organisations involved in the impending Presidential election.

2020-09-14

Four Essential Questions To Ask A Cybersecurity Expert

Most companies should consider hiring a cybersecurity expert in order to keep their confidential information safe. by Jennifer Bell

2020-09-14

Schoolchildren Are Better At Cyber Security Than Their Teachers

Many teachers believe their pupils have better knowledge of cybersecurity than they do. Half don't think their school has done enough to stay secure.

2020-09-14

Cyber Security Deadline For Mariners

The international deadline to incorporate cyber security into seagoing systems looms, but many questions about training mariners remain.

2020-09-09

British Cyber Security Market 2020

Analysis of the UK cyber security industry, including its size, employment & revenue, reveals that business is booming across all sectors.

2020-09-10

Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Implementing a Risk-Based Vulnerability Management Solution is easier than you think. This Guide from Tenable shows how: Download

2020-09-04

Cyber Security: Take Action

Cyber Resilience: Keeping a business cyber-secure is not an easy option and requires specialist knowledge and analysis. We can help.

2020-09-04

Cyber Attacks On Norway’s Parliament

Berlin, Westminster, Strasbourg. Now Norway's Oslo parliament has been hit by a significant cyberattack with MPs' email accounts hacked.

2020-09-07

The Risks & Benefits Of Cloud Security

Cloud computing involves relying on a service provider to store and process your vital data, which requires a willingness to give up control.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

e360

e360

e360 (formerly Entisys360) is an award-winning IT consultancy specializing in advanced IT infrastructure, virtualization, security, automation and cloud first solutions.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Mode Solutions

Mode Solutions

Mode guarantee IT performance where you need it most, creating seamless and secure solutions that will alleviate pressure from your business.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

Cyphershield

Cyphershield

Cypershield is a Security and Smart Contract audit company providing professional smart contract auditing services for varied Crypto projects.

Ipseity Security

Ipseity Security

Ipseity Security provide security-centric advisory and consulting services for organizations to secure their perimeter-less digital transformation to meet business and security requirements.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.

Qwiet AI

Qwiet AI

At Qwiet AI we enable you to prevent cyberattacks by securing code from the start. Secure code in three steps.