FREE TO VIEW


« Back to News

2021-06-10

Closing The Space Between Cybercrime & Cybersecurity

Failing to understand the intersection between the threats posed by cybersecurity and cybercrime leaves blind spots wide open to exploitation.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

2021-06-08

Identifying & Minimizing Security Vulnerabilities For Your Organization

Despite the very best security efforts, small flaws in cyber security architecture can pose a great threat to business assets and operations.

2021-06-07

Fake Finance Apps Focus On Theft

Fake banking, trading and crypto-currency apps are being used by criminals to steal money and financial information from unsuspecting users.

2021-06-07

Microsoft’s Defensive Playbook

Microsoft is offering a series of incident response ‘playbooks’, giving advice to business leaders on how to defend against cyber attacks.

2021-06-07

Russian Hackers Targeting International Aid Groups

Intelligence Gathering Effort : An estimated 3,000 email accounts at more than 150 different organisations have been attacked this month.

2021-06-07

Huawei Chooses UAE As Cyber Security Hub

Huawei is helping UAE to establish Smart City and e-governnent infrastructure to create a "globally trusted digital oasis” safe from cyber threats.

2021-06-07

US Media Group In Latest Ransom Attack

Live streams for radio and TV stations owned by the Cox Media Group have been knocked offline in an undisclosed ransom attack.

2021-06-04

Cyber Security Mergers & Acquisitions - May 2021

Cybersecurity mergers and acquisitions activity continued at a high rate in May with 35 deals involving companies from 12 countries.

2021-06-02

Avoiding The Privacy Paradox In The Workplace

Internet users are rightly becoming more concerned about data tracking and their personal privacy. There are some ways to get protection.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

Cleafy

Cleafy

Cleafy are a team of fraud hunters, cybersecurity experts, data scientists, and software engineers. Our purpose is to make people’s life easier and free from the threats in the digital ecosystem.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

SevenShift

SevenShift

SevenShift is a security consulting firm with a wealth of experience in the worlds of Cybersecurity and Internet of Things (IoT).

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Forever Group

Forever Group

Forever Group is a Managed Services Provider specialising in Telecommunications, IT Support, and Cyber Security.

Wizard Cyber

Wizard Cyber

At Wizard Cyber, we simplify cyber security, delivering an advanced service that protects your high-risk assets from the complex threats that technology alone can miss, 24/7.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

Beacon Technology

Beacon Technology

Beacon Technology offers a comprehensive platform consisting of XDR, VMDR, and Breach and Attack simulation tools.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.

Unosecur

Unosecur

Unosecur is a comprehensive identity security platform that addresses identity-related threats in multi-cloud and on-premise environments.