FREE TO VIEW


« Back to News

2020-04-07

An 'Infodemic' Of Phishing & Malware

Cybercriminals are using the COVID-19 panic to infect and scam users with coronavirus related phishing emails. By David Balaban

2020-04-07

The US Has A New 5G Security Strategy

The US intends to protect its fifth-generation wireless infrastructure at home and overseas and President Trump has laid out his plan to do so.

2020-04-06

IoT – Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-04-06

Zoom-Bombing Hijackers

FBI Warning: Unwanted guests intruding on video conferences for malicious purposes has significantly increased during the pandemic.

2020-04-03

Fighting Fake News With Cyber Intelligence

The EU and Canada are tracking a blizzard of fake news about the impact of the Coronavirus which originates from Russian and Chinese sources.

2020-04-01

Beware Spoofing Attacks

Spoofing Is No Joke: Eleven types of spoofing attack that every security professional should know about. By David Balaban

2020-04-03

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 | Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

2020-03-31

Stay Cyber-Secure Working From Home

People working from home are a lot more vulnerable than inside a secure office environment - Here is advice for workers and their employers.

2020-04-03

Universities That Teach Cyber Security At Risk

Leading universities in Britain and the US that teach and research Cyber Security are finding that they are themselves subject to a range of attacks.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

WEBINAR: How to design a least privilege architecture in AWS

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 - Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Go Cyber

Go Cyber

Go Cyber is a new, highly innovative cyber security training app that uses action based learning to significantly improve the online behaviour of all employees in less than a month.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

EACS

EACS

Award winning and trusted provider of IT solutions and managed services to a wide range of UK organisations.

Information Security Buzz

Information Security Buzz

Information Security Buzz is an online resource providing breaking news for the industry. Content is carefully selected and aggregated from many credible sources

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Prevailion

Prevailion

Prevailion’s technology provides unprecedented visibility into your own network as well as third party partners empowering you to mitigate their compromise before it becomes your own.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.