FREE TO VIEW


« Back to News

2021-10-26

GCHQ Boss Says Ransomware Attacks Have Doubled In A Year

Ransomware attacks have become increasingly popular with cyber criminal as they are “largely uncontested” and highly profitable.

2021-10-26

Facebook Is 'making hate worse'

Pushing To The Extreme: An ex-employee has made a damning indictment of Facebook, making a powerful impact on British legislators.

2021-10-26

Cyber Security - How Confident (Complacent?) Are You?

How often should organizations review their cyber security strategy? If it's not been done recently, the chances are you’re at risk. By Paul German

2021-10-22

Top Nine Technology Trends Of 2021

The technology industry is evolving fast and keeps improving every passing day. Here are some of the latest technology trends to be aware of.

2021-10-25

Israeli Hospital Attacked With Ransomware

Israel's hospitals have been advised to print out patients’ medical files to ensure operational continuity in case of further attacks.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-10-25

Google Creates Its Cyber Security Action Team

Team Mission: "supporting the security and digital transformation of governments, critical infrastructure, enterprises & small businesses".

2021-10-25

US Cyber Security ‘Kindergarten’ Compared To China

Pentagon CSO Quits: China is heading towards global dominance in AI due to the relatively slow pace of innovation in the United States. 

2021-10-22

Making Sure Your Business Is Cyber Smart

Being cyber smart this Cybersecurity Awareness Month is certainly achievable, but it requires investment of both time and money.

2021-10-20

New Report: Average SIEM Deployment Is Over 6 Months

Real Time: Security Information and Event Management Software (SIEM) allows security teams to keep on top of security alerts as they happen.

2021-10-20

Protecting Your Business Data Using Fake Information

Convincing Decoy: An algorithm can frustrate phishing attacks by generating fake versions of every document that organisations need to protect.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

Jamcracker

Jamcracker

Jamcracker is a cloud services management and cloud governance solutions company, with more than a decade of experience providing industry leading software and services.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

Mend.io

Mend.io

Mend.io (formerly known as WhiteSource) is an application security company built to secure today’s digital world.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

N8 Identity

N8 Identity

N8 Identity helps organizations realize the vision of Autonomous Identity Governance™ with AI-driven Identity solutions.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Abstract Security

Abstract Security

Abstract Security has created a revolutionary platform, equipped with an AI-powered assistant, to better centralize the management of security analytics.

CESAR

CESAR

CESAR is one of the premier R+D and innovation centers in Brazil and a designated Cybersecurity Competence Center.

StackGen

StackGen

StackGen (formerly appCD) automatically generates Infrastructure from Code (IfC) based on application code with golden standards applied.