FREE TO VIEW


« Back to News

2021-04-09

The Future Of Blockchain In Cyber Security

Blockchain technologies are the culmination of decades of research into cryptography and have an inherent connection to cyber security.

2021-04-09

Credentials Phishing Attacks

Attackers are adapting and have some new tactics to serve up credential phishing pages as way to bypass existing Office365 detection measures.

2021-04-09

Half A Billion LinkedIn Members Found For Sale

LinkedIn Sliced Open: IDs, names and email addresses comprise a massive archive of stolen data, placing 500 million LinkedIn users at risk.

2021-04-07

FatFace Pays $2million Ransom To Cyber Criminals

Mugged: Criminals agreed to discount their ransom to save the victim from bankruptcy. Then they offered their advice on better cyber security.

2021-04-07

Twenty Cyber Security Startups To Watch

Cybersecurity startups have raised $1.9B to date and are on track to raise a total $7.6B from investors in 2021. Here are the eye-catchers.

2021-04-06

Cybersecurity For Financial Services: Latest Trends For Fraud Prevention

Financial services companies need to anticipate and prevent fraud by unearthing and fixing loopholes faster than the bad guys. By David Lukić

2021-04-06

Over 500m Facebook Users' Data Posted On A Hacking Website

The personal information of about half a billion Facebook users, including their phone numbers, have been posted to a website used by hackers.

2021-04-06

The Satanic Mills of the Fourth Industrial Revolution

America has a huge role to play in the Fourth Industrial Revolution, if it is smart enough and disciplined enough to embrace it. By Ronald Marks

2021-04-05

Your Employee's Cyber Awareness Is Critical

Organisations need a culture of data security and employees are the caretakers of their own organisation’s most valuable and sensitive data.

2021-04-05

The European Union Adopts A Cyber Security Strategy

An agreed EU framework to defend businesses, organisations and citizens from cyber attacks and to promote secure information systems.

2021-04-05

Employees Hired & Fired By Algorithm

Nothing Personal: AI can be used to improve productivity, but it is already being used to make life-changing decisions about people at work.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManagedMethods

ManagedMethods

ManageMethods Cloud Access Monitor is the only Cloud Access Security Broker (CASB) that can be deployed in minutes, with no special training, and with no impact on users or networks.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

HDI Global SE

HDI Global SE

HDI Global SE provides customised insurance solutions for industrial and commercial clients worldwide including Cyber Liability insurance.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

META-Cyber

META-Cyber

META-cyber was founded by engineers with experience in process and control-protection to provide cyber security for industrial infrastructure.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.

Qubika

Qubika

Qubika are shaping the future of next-generation applications by seamlessly integrating high-quality UX, robust security, and AI-driven intelligence.