FREE TO VIEW


« Back to News

2023-05-15

Effective Enterprise Vulnerability Management & Compliance

ManageEngine Vulnerability Manager Plus: The comprehensive and effective enterprise vulnerability management and compliance solution 

2023-05-15

How Cybercriminals Profit From Your Personal Information

Protect Your Data Online: Multiple websites on the dark web are used for buying user information from cyber criminals - you should take precautions.

2023-05-12

Businesses Must Prepare For 90-Day Certificates

Google’s 90-Day Certs Are Coming: With enough time to prepare & automation readily available, there is no excuse to be caught out. By Tim Callan

2023-05-15

Which Sectors Are Top Targets For Cyber Crime?

Banks, Healthcare & Food Retailers: The latest threat intelligence from Blackberry found 60% of all attacks targeting these three key industries.

2023-05-12

What Is The Difference Between Phishing, Smishing & Vishing? 

An Internet user falls victim to cybercrime every 37 seconds: The more we understand scams, the better equipped we are to avoid becoming victims. 

2023-05-11

What The Latest Cybersecurity Trends Mean For Your SME 

Prevention Is Better Than Cure: Employee awareness, a protected domain name and strong authentication protocols can help manage risk.

2023-05-10

NSA Warning: China Is Stealing AI Technology

The US National Security Agency tells US technology companies to be aware of Chinese attempts to steal their Artificial Intelligence technology.

2023-05-10

Ransomware Attack Hits US Shipyard

The shipyard building the US Navy’s Littoral Combat Ship & Constellation-class guided-missile frigate has suffered a ransomware attack.

2023-05-10

Open Source Software In The Cloud

Researchers have linked the significant use of open source software to an increased need for high levels of vigilance by users. 

2023-05-10

Smart Gun Uses Facial Recognition Technology

James Bond's Pistol: A gun that can only be fired after verifying the shooter’s identity uses facial recognition and fingerprint technology.

2023-05-17

Google’s New Cyber Security Certificate Program

Careers: Google has a new six month entry-level US certification training program aimed at a new generation of cyber security professionals.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Cyber Resilience Centre for Wales (WCRC)

Cyber Resilience Centre for Wales (WCRC)

The Cyber Resilience Centre for Wales (WCRC) is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Otava

Otava

Otava is a global leader of secure, compliant hybrid cloud and IT solutions for service providers, channel partners and enterprise clients.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.