FREE TO VIEW


« Back to News

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-11

African Nations Join UN Cyber Crime Initiative

In 2050, one in four of the world’s people will come from sub-Saharan Africa - their current digital challenges need to be addressed. By Karen Allen

2022-01-11

The Cyber Skills Shortage & Training Gap - What Is The Solution?

Oganisations must understand the importance of cyber security technologies & professionals before they suffer an attack. By Thorsten Stremlau

2022-01-11

Apple’s Cyber Security Flaws Didn’t Stop It Reaching $3 Trillion

Apple has hit a record market valuation of $3tn, even although it turns out that what happens on your iPhone, doesn’t always stay on your iPhone.

2022-01-11

Kazakhstan Shuts Down The Internet

State Of Emergency: The Kazakhstan government switched off the Internet in response to violent protests, bringing the economy to a halt.

2022-01-11

Super Intelligent Machines Need An Off Switch

They’re Already Here: An AI system with superior intelligence to humans could learn independently & have access to all the data of humanity.

2022-01-10

What To Expect From Data Science In 2022

What's Going On: Data science is being applied to multiple industries for different purposes across a broad range of business operations.

2022-01-10

Cyber Security Threats In 2022

Ransomware & Remote Working: The key issue for business cyber security is to make  the transition from reactive to proactive behaviour. 

2022-01-10

Avoid Being A Victim Of Cyber Crime – Get Audited

A cyber security audit is a systematic evaluation of a company's information security by measuring how well it conforms to established criteria. 

2022-01-09

The Complexities Of Operational Technology Make It Vulnerabe

Industrial organisations need to adapt quickly to the expansion of cyber security threats to protect complex Operational Technology systems.

2022-01-06

Russia Fines Google For Illegal Content Breach

Google is fined 7.2 billion roubles in a revenue-related penalty for the repeated failure to delete content which is illegal under Russian law.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Ledger

Ledger

Ledger is a leader in security and infrastructure solutions for cryptocurrencies and blockchain applications using its proprietary technology.

Elron Ventures

Elron Ventures

Elron partner with early stage ventures to build companies that transform lives and industries. Our main areas of focus are enterprise software, cybersecurity, and healthcare.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Sixteenth Air Force (Air Forces Cyber) - USA

Sixteenth Air Force (Air Forces Cyber) - USA

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Protelion

Protelion

The Protelion Security Platform is uniquely architected to deliver security solutions that combine greater protection, flexibility, and performance.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Lakera

Lakera

Lakera empowers developers and organizations to build GenAI applications without worrying about AI security risks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.