FREE TO VIEW


« Back to News

2021-09-22

The CISO's Job Is Getting More Complex

Evidence suggests that the the role of a CISO has never been more complex, challenging and critical to the resilience of the organisation they work for.

2021-09-22

EU Proposes Legislation To Secure Connected Devices

The European Commission has put forward a number of policy proposals to introduce mandatory cyber security standards for connected devices. 

2021-09-22

US Intelligence Hackers Available For Hire

Three former US intelligence operatives have admitted to breaking US laws by carrying out hacking operations for the United Arab Emirates.

2021-09-21

Cyberspace & Outer Space Are New Frontiers For National Security

Countries need to address the intersection between outer space and cyberspace for their security and defence policies. By Eliza Sadler

2021-09-21

Zero Trust Architecture - No Longer A ‘Nice to Have’

A Zero Trust mindset is now an operational necessity & there are some essential components organisations must adopt. By Paul German

2021-09-20

AUKUS Defence Pact Between US, Britain & Australia

Strategic Shift: Its not just about submarines - shared capabilities will include cyber security, quantum computing and artificial intelligence.

2021-09-16

Everything You Need To Know About Business Password Safety

The majority of data breaches happen because of poor password security and here are the main threats to password safety. By Emily Matthews

2021-09-17

Australia’s Critical Infrastructure Is Under Constant Attack

A cyber attack is being reported in Australia every 7.8 minutes as sophisticated hackers target critical infrastructure and essential services.

2021-09-17

Industrial Companies At Risk As Attacks Double

Unprepared: The industrial sector experienced a 91% jump in attacks and a 54% rise in malware-related attacks in 2020 compared to 2019.

2021-09-17

HCL & Dell Unite Against Ransomware

PowerProtect: HCL and Dell combine expertise and service to secure customer data and build resilient IT systems with an automated solution.

Perimeter 81

Directory of Suppliers

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Allot

Allot

Allot are a global provider of innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

International Federation of Robotics (IFR)

International Federation of Robotics (IFR)

The International Federation of Robotics connects the world of robotics around the globe. Our members come from the robotics industry, industry associations and research & development institutes.

FedRAMP

FedRAMP

FedRAMP, is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

ISARA Corp

ISARA Corp

ISARA Corporation is a security solutions company specializing in creating class-defining quantum-safe cryptography for today's computing ecosystems.

Redshift Consulting

Redshift Consulting

Redshift is an information management and information security consulting company offering a full range of services from infrastructure design to security assessments and network monitoring.

CopSonic

CopSonic

Copsonic provide a technology solution based on ultrasonic waves to send secure and encrypted data between two devices in order to achieve authentication.

Crypto4A

Crypto4A

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

Littlefish

Littlefish

Littlefish provide world-class, award-winning Managed IT and Cyber Security Services, delivered from our 24/7 UK service centres.