FREE TO VIEW


« Back to News

2021-07-16

How B2B Companies Can Use Cyber Security For Data Protection

For optimum data protection, actionable intelligence needs to be followed up with robust cyber security solutions. By Lidia Hovhan

2021-07-15

Cyber Security Careers for Women

When news of state-sponsored attacks or massive data breaches are a daily event, it seems crazy that for many, cyber security is a closed door.

2021-07-14

Over 40% Of UK Organisations Reported To ICO Since GDPR

A survey suggests a lack of cyber resilience, with IT leaders having difficulty locating & securing data and in understanding their GDPR data obligations.

2021-07-14

British Police Double Down On CyberAlarm

A free police-led monitoring tool helps business users understand malicious online activity and improve their security and cyber resilience.

2021-07-12

The Five Most Common Security Mistakes At Work

Remote working has its benefits but working from home is very risky. Here are some of the most common mistakes to avoid. By Elizabeth Hines

2021-07-13

Biden Warns Putin The US Will React To Attacks

Following a wave of damaging ransomware incidents Biden has told Putin the US will take "any necessary action" to stop further Russian attacks.

2021-07-12

The Post-Covid Cyber Security Challenge

The post-pandemic recovery presents the opportunity for organisations to rebuild a 'new normal' with much better resilience as the goal.

2021-07-12

India’s New National Cyber Security Strategy

The new strategy is a guideline for governance, national data resources, building indigenous capabilities and cyber audit standards.

2021-07-12

Seven Steps To Create An Effective Disaster Recovery Plan

All organisations need an effective Cyber Disaster Plan in place to reduce the chances of a data loss from a cyber attack or ransomware demand.

2021-07-12

Russian Military Hackers Accused Of Global Campaign

Surprise: The NSA, CISA, FBI & NCSC all agree that Russia's GRU military intelligence agency is behind a damaging worldwide hacking campaign.

2021-07-12

The Qualities That Make A Successful Cyber Team

Skilled cyber security professionals are key for the safety of companies & governments. The US military is aiming to identify the core competencies.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Farsight Security

Farsight Security

Farsight Security provides the world’s largest real-time actionable threat intelligence on how the Internet is changing.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

Learn How To Become

Learn How To Become

At LearnHowToBecome.org, our mission is to help any job-seeker understand what it takes to build and develop a career. We cover many specialist areas including cybersecurity.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

C3i Hub

C3i Hub

C3i Hub aims to address the issue of cyber security of cyber physical systems in its entirety, from analysing security vulnerabilities to developing tools and technologies.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Wired Assurance

Wired Assurance

Wired Assurance is a testing and assurance company, specialized in software applications and blockchain smart contracts.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

Qodea

Qodea

Qodea (formerly Appsbroker CTS) is Europe's largest Google Premier only transformation partner.

DeepStrike

DeepStrike

DeepStrike is a leading cybersecurity firm specializing in human-powered, high-quality penetration testing designed to protect businesses from evolving cyber threats.