FREE TO VIEW


« Back to News

2022-06-29

Cyber Security Tools For Your Small Business

Hackers love targeting small businesses and investing in cyber security tools can reduce your business' vulnerability and save valuable resources. 

2022-06-27

Russia Escalates Spying On Ukraine’s Allies

Russian state-backed hackers have been identified as conducting espionage against 128 organisations in 42 countries allied to Ukraine.

2022-06-27

US Bank Loses Critical Data Of Over A Million Customers - Again

Flagstar Bank has disclosed a second major data breach where criminals got access to the personal information of 1.5 million customers.

2022-06-27

Murder Enabled By Social Media

Instagram & Snapchat: British schoolchildren lured a 13-year-old to a park where he was stabbed to death were motivated by images on social media.

2022-06-21

Putin Lashes Out After His Speech Is Delayed By DDoS

President Putin launched a tirade against Western Governments after his conference speech was delayed by an hour due to a cyber attack.

2022-07-06

Global Government Spending On IT To Grow 5%

Global government IT spending is forecast to be $565.7 billion in 2022, an increase of 5% from 2021, and cloud solutions will take a bigger share.

2022-07-14

Coming Soon: Your Digital Twin

A digital twin is an exact replica of something in the physical world, but with a unique mission to test and improve the real-life version.

2022-07-14

Cyber Security Training For Employees & Employers

Go Cyber: A different training approach that has a lasting, very positive impact and can significantly improve your organisation’s cyber security.

2022-07-14

Canada Considers Mandatory Reporting Of Cyber Attacks

Growing International Threats: The federal government is planning to compel Canadian businesses and companies to report cyber attacks.

2022-07-06

Channel 4 TV Launches New Cyber Thriller

The Online Frontline: Channel 4 has launched a highly anticipated new six-part cyber thriller The Undeclared War, set in a dramatised GCHQ.

2022-07-11

Bluetooth Devices Can Covertly Track Mobile Users

A Significant Privacy Risk: Your smartphone & laptop give off unique Bluetooth radio signals that can be identified and used to track your location. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

Zerto

Zerto

Zerto provides enterprise-class disaster recovery and business continuity software specifically for virtualized data centers and cloud environments.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Konfidas

Konfidas

Konfidas provide high-level cybersecurity consulting and professional tailored solutions to meet specific cybersecurity operational needs.

XCure Solutions

XCure Solutions

XCure Solutions are a Finnish company specializing in data security, data protection and data recovery.

CRI4DATA

CRI4DATA

CRI4DATA's mission is to help organizations build their resilience to cyber risk.

Keyavi Data

Keyavi Data

With Keyavi’s evolutionary data protection technology, your data stays within the bounds of your control in perpetuity.

SafeTech Informatics & Consulting

SafeTech Informatics & Consulting

Safetech's OTShield detects, prevents and analyses cyber-attacks in SCADA and Industrial IoT systems by utilising state of the art deception techniques.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

Wabbi

Wabbi

Wabbi’s continuous security platform centralizes, automates and orchestrates security governance and vulnerability management to empower development teams to own appsec.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Ministry of Electronics & Information Technology (MeitY) - India

Ministry of Electronics & Information Technology (MeitY) - India

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

DefectDojo

DefectDojo

DefectDojo is a DevSecOps and vulnerability management tool.