FREE TO VIEW


« Back to News

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-07-05

Pentagon CISO Accused Of Leaking Classified Intel

The top Pentagon official, who was overseeing its new cyber security initiative, has been placed on indefinite leave while being investigated.

2021-07-05

Data Dominance: EU Investigates Google

The investigation will examine Google's role in collecting data, selling advertising space and acting as an online-advertising intermediary.

2021-07-05

Artificial Intelligence Can Reduce Cyber Attacks

AI is an effective solution to protect organisations from cyber attacks, but it can also be used by hackers to launch complex, automated attacks.

2021-07-03

Massive Attack: 200+ US Organisations Hacked

In a replica of SolarWinds, over 200 US organisatations have been struck with ransomware via a large scale infection of their IT supply chain.

2021-07-02

Ransomware Attack Protection

Ransomware has become one of the biggest threats organisations face and criminals are extorting increasingly large sums from victims.

2021-07-01

How To Write Learning Objectives For Cyber Security Training

It is vital to implement clear learning objectives for the delivery of cyber security training and implementation. Here's how. By Jessica Fender

2021-06-30

US Companies Aren’t Preparing For Cyber Attacks

Business leaders seem unwilling to act until after the event. They must step up now and realise that cyber security is not optional - it’s essential.

2021-06-30

How To Prevent Healthcare Data Breaches

Healthcare is the most highly targeted sector for criminals trying to steal data, which calls for stringent security measures. By Narendra Sahoo

2021-06-29

2021 - Inside The Dark Web

A short guide on how you can access those hidden sectors of the internet that provide users the anonymity to explore a range of criminal options.

2021-06-29

China Is Gaining Technical Supremacy

British spy chiefs warn that leadership in key technologies affecting national security, including AI and Quantum Computing, is moving East.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Okta

Okta

Okta is an enterprise-grade identity management service, built from the ground up in the cloud to address the challenges of a cloud-mobile-interconnected world.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

SoftLock

SoftLock

Softlock is a regional leader in Information Security providing solutions, consulting, integration and testing services to protect information assets, identities and supporting infrastructure.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Hexagon

Hexagon

Hexagon is a global leader in digital reality solutions. We are putting data to work to boost efficiency, productivity, quality and safety.