News

2016-02-15

CIO Work Report - Executive Brief (£)

Studies of Chief Information Officer (CIO) employment shows that they tend to stay in a job on average for only 4 years and 4 months. Nevertheless, the likelihood of a long career often increases significantly for those CIOs that stay longer than 2 years and get engaged with their organisations.

2016-02-15

Corporations Drowning In The Data Flood (£)

All businesses have a major problem waiting for a solution but, is it something that most Boards never talk about. The storage of data, its costs and lack of use is a problem and an opportunity awaiting a solution.

2016-02-15

Proposed UK Law Requiring Business To Disclose Cyber Attacks (£)

Governments will over the next decade introduce legislation forcing businesses to firms to notify shareholders and police immediately after they have been hacked just as they would be expected to do for traditional security breaches.

2016-02-15

Board Directors' Adaption to the New Digital Revolution (£)

Boards need to discuss the level of cyber risk tolerance for various assets and threats, how cybersecurity is factored into business decisions and business relationships particularly if you use aspects of the Cloud.

2016-02-15

Board Questions To The CIO (£)

Do we analyse the markets we are in using social media data and how effective is the analysis software we are using? What results have we achieved and how is this changing the way we market and sell products and services?

2016-02-15

Cyber Questions Directors Should Ask CIOs (£)

The cyber pressure on Directors and Boards is increasing as the hack attacks increase. This process is not going to stop in the medium term and understanding of your responsibility and improving your own comprehension of the cyber risks and the digital opportunities is extremely important.

2016-01-26

Education: Introvert Personalities Go Mobile & Online

Educators are making the transition to tech-enabled discussions.

2016-01-29

Ukraine’s Power Grid Attacked By Russia

Highly destructive malware that infected at least three regional power authorities in Ukraine

2016-01-26

Ukraine Is Blaming Russian State Sponsored Hackers

The Ukrainian Government is suffering a series of power outages likely caused by cyber attacks caused by Russian hackers.

2016-01-26

Another List Of Top Security Predictions For 2016

Extortapalooza: Here are some more best guesses about security threats 2016.

2016-01-26

‘I Hacked Citrix’ - Mystery Russian ‘w0rm’

Citrix, a US software company, specialising in virtualisation & cloud computing, has been compromised by a Russian hacker called w0rm.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

CyberSift

CyberSift

CyberSift is a cyber security provider. We develop threat detection software which needs no infrastructure changes as it integrates with almost any security tool.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

NSIDE Attack Logic

NSIDE Attack Logic

NSIDE Attack Logic simulates real-world cyber attacks to detect vulnerabilities in corporate networks and systems.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Patriot Consulting Technology Group

Patriot Consulting Technology Group

Patriot Consulting's mission is to help our clients manage cybersecurity risk through secure deployments of Microsoft 365.

FTI Consulting

FTI Consulting

FTI Consulting is a global business advisory firm dedicated to helping organizations manage change, mitigate risk and resolve disputes.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.