FREE TO VIEW


« Back to News

2022-10-11

In Many Cases Active Directory Is The Last Line Of Defence

Organisations of all sizes across every industry are failing to address Active Directory security gaps that leave them vulnerable to cyber attacks.

2022-04-01

Germany Warns About Russian Anti-Virus Software

Germany's cyber security authority has issued a warning against using anti-virus software from the Russia-based service supplier Kaspersky.

2022-03-30

The Global Cyber Security Market Set To Grow By $190 Billion

Annual market growth well over 12% will be driven by increased demand from mobile usage, the IoT and many more Intenet users worldwide.

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-29

LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks

Source Code: Ubisoft may be the latest victim of hackers that have already attacked the chipmaker Nvidia and electronics giant Samsung.

2022-03-29

Conti Operates Like A Sophisticated Corporation

Hidden In Plain Sight: Staff think they are working for a legitmate Russian High-Tech firm, but in reality it is a notorious ransomware group.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

2022-03-28

Only A Few Employees Cause The Majority Of Breaches

Research has found that 4% of employees clicked 80% of phishing links and that 3% were responsible for 92% of malware events.

2022-03-22

US Moves Cyber Defences To High Alert

Americans should ‘lock their digital doors’ to prepare for a Russian cyber attack as federal agencies and busineses are urged to remain vigilant.

2022-03-22

Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats

Only 27% of those surveyed have advanced threat protection on every endpoint device, placing access to corporate applications at great risk.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

YouWipe

YouWipe

Scandinavian Data Erasure Leader YouWipe is the number one choice of European Ministries, European Central Banks, Swiss Pharmaceuticals and Major Electronics Retail Chains.

United Network Technologies

United Network Technologies

United Network Technologies is a leading Managed Services Provider, distributor and developer of specialised cyber security components and technologies.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

StrataCore

StrataCore

StrataCore is a single-source technology lifecycle advocate that works behind IT teams as a strategic partner to help them achieve peak enterprise outcomes.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

Maintel

Maintel

Maintel provides cloud and managed communications services. We help our customers to deliver exceptional customer experiences, and to securely access their applications and their data.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Ofcom

Ofcom

Ofcom is the UK's communications regulator. We regulate the TV, radio and video on demand sectors, fixed line telecoms, mobiles, postal services, plus the airwaves over which wireless devices operate.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.

Monokee

Monokee

Monokee offers a solution that seamlessly integrates powerful Identity and Access Management (IAM) capabilities with a low/no code identity orchestrator.