FREE TO VIEW


« Back to News

2021-06-28

Bad Cyber Security Behavior At Home Risks Being Taken Back To Work

A hybrid working structure creates a fundamental shift in cyber security priorities and the bad habits of remote work could reinfect the workplace.

2021-06-28

Ukraine Cyber Police Crack Hacker Group

Ukraine's Cyber Police have exposed a ransomware group responsible for a string of attacks and the extortion and theft of $500 million.

2021-06-28

Diversity In Cyber Security

Improving diversity should help cyber security teams deploy a wider range of thought and use stronger concepts to defend against attacks.

2021-06-28

Russia Wants A Deal With The US On Cyber Security

President Putin says he could reach an agreement with the US on the rules of behavior in the fields of strategic stability and cyber security.

2021-06-28

(ISC)² Offers Free Ransomware Training

(ISC)2 is offering a free public ransomware training course to help organisations defend their critical assets from increasingly prevalent threats.

2021-06-25

Social Media’s Effects On Mental Health

Life Online: While social media has its benefits, it’s important to remember that it can never be a replacement for real-world human connection.

2021-06-24

Maritime Shipping Line Under Attack

The shipping industry continues to be the target of cyber criminals as South Korean carrier HMM becomes the latest to suffer a cyber attack.

2021-06-24

Mobile Users Are A Security Weakspot

Remote Working & Mobile Access: IT decision makers believe their organisations are more vulnerable to mobile cyber attacks than ever.

2021-06-23

Global Police Operation Closes Fake Pharma Websites

A global policing operation has led to the closure of over 100,000 websites and online marketplaces selling fake pharmaceuticals worth over $23m.

2021-06-23

Negotiating Ransom: To Pay Or Not?

Factors to consider when responding to a ransom demand include the readiness of your backup network & data, insurance and customer reaction.

2021-06-22

DarkSide May Not Stay Dark For Long

The DarkSide hackers allegedly disbanded after carrying out the Colonial Pipeline ransom attack, but could come back soon under a different name.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

X-act Forensics

X-act Forensics

X-act forensics are computer forensic experts with experience in cases of computer fraud, intellectual property theft, and social networking cases.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Digital Security Authority (DSA) - Cyprus

Digital Security Authority (DSA) - Cyprus

The establishment of the Digital Security Authority, which incorporates the National CSIRT, is crucial to significantly raising the cybersecurity posture and capabilities of Cyprus.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

BCX

BCX

BCX, a subsidiary within Telkom Group, is one of Africa’s largest systems integrator and digital transformation partners for enterprises and public sector organisations.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

Noma Security

Noma Security

Noma Security's mission is Application Security for the Entire Data & AI Lifecycle.