FREE TO VIEW


« Back to News

2021-08-03

Learn how to detect and respond to insider threats

Thursday, August 19th, 2021 | SANS and AWS Marketplace webinar | How to build a detection and response strategy for insider threats.

2021-08-03

No More Ransom Saves Victims

According to Europol, a service called No More Ransom Repository has assisted in the recovery of valuable information and saved victims €1B.

2021-08-03

Cyber Attacks May Lead To A “shooting war”

President Biden warns Russia & China that persistent damaging ransomware attacks on US institutions could result in a real shooting war.

2021-08-04

Cyber Security Standards For Critical Infrastructure

The White House issues a national security memo instructing CISA & NIST to establish cyber security performance goals for critical infrastructure.

2021-10-12

AI Tool Promises A Medical Revolution

Accelerating Research: A new Artificial Intelligence tool called AlphaFold can correctly predict the 3D structure of 98 percent of human proteins.

2021-08-03

Nexperia - A Bigger Threat Than Huawei?

Britains largest computer chip manufacturer could be acquired by China's Nexperia, creating a "first order strategic issue" say cyber security experts.

2021-08-05

Home Working Creates More Cyber Attacks

As organisations prepare for a post-Covid world, one of the many issues they will have to address is much better IT security for home workers.

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-08-04

2021 Global Cyber Security Event

(ISC)² the world’s largest association of certified cybersecurity professionals releases the agenda for its annual Security Congress in October.

2021-08-02

Saudi Aramco Faces $50m Ransom Demand

Aramco has lost 1 TB of company data and the hackers are demanding a $50 million ransom in cryptocurrency to restore the files.

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

ControlMap

ControlMap

ControlMap is a software as a service platform with a mission to simplify and eliminate stress from everyday operations of modern IT compliance teams.

Feroot Security

Feroot Security

Feroot Security secures client-side web applications so that businesses can deliver a flawless user experience to their customers. Our products help organizations protect their client-side surface.

Bright Data

Bright Data

Bright Data Inc is the world’s #1 web data platform, enabling organizations to research, monitor, analyze data, and make better decisions.

HCS

HCS

HCS is an IT Company and Telecoms provider with an experienced team who are dedicated to ensuring our clients business systems are protected.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Gleam Cloud Security Solutions (GCSS)

Gleam Cloud Security Solutions (GCSS)

GCSS Security is an information security firm providing cyber security protection with a highly skilled and experienced team focused on technology that creates best-in-class customer experiences.

Xygeni

Xygeni

Xygeni is a leader in Application Security Posture Management (ASPM). Our advanced technology detects malicious code in real-time to prevent malware infections.

CPX

CPX

At CPX, we go beyond addressing today’s security risks—we anticipate the challenges of tomorrow.