FREE TO VIEW


« Back to News

2021-02-11

How To Create Effective Cyber Security Training For Employees

Prevention Is The Best Solution: Cybersecurity training is the best tool for effective prevention and protection from cyber attacks. By Kristin Savage

2021-02-10

Russian Government Warns Business Of US Cyber Attack

The Russian government has issued a cyber security warning to organisations at risk of US reprisals for the devastating SolarWinds attacks.

2021-02-10

Data Privacy & You

Trust: Consumers are willing to trade their personal data for personalisation, but they also have growing concerns about data privacy.

2021-02-09

Use The Military To Attack Hackers

The former chief of CISA says the US military should hit back at the cyber criminals that have hacked government agencies and organisations.

2021-02-09

Losses From Cyber Crime Exceed $1Trillion

Cyber criminals are shifting focus from individuals and small businesses to major corporations, governments and critical infrastructure.

2021-02-09

Everything You Need To Know About Hashing Algorithms

Hashing is a new method that aims to protect personal data and is widely used in cryptography and blockchain. How does it work?

2021-02-08

Cloud Migration Challenges For Healthcare Organisations

The Coronavirus has forced healthcare organisations to speed up cloud migration, which may actually leave them at a higher level of risk.

2021-02-08

More Critical Problems With SolarWinds

SolarWinds have learned of three more critical vulnerabilities with their software which could allow an attacker to steal their customers' vital data.

2021-02-08

Myanmar’s New Military Rulers Block Facebook

For many of the population social media is their only access to the Internet and Facebook has become a rallying point against the military coup.

2021-02-10

Webinar: Architect a security-driven networking strategy in the AWS Cloud

Learn how to create a security-driven networking strategy for the AWS Cloud - technologies, processes, and policies. Thursday, February 25th

2021-02-05

Bug Bounty & Crowd-Sourced Cyber Security

As the importance of cyber security to the economic survival of companies grows, many more CISOs are turning to ethical hackers for help.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

CSC Cyber Games

CSC Cyber Games

CSC Cyber Games is an innovative platform dedicated to empowering individuals with the tools and knowledge to excel in the ever-evolving world of cybersecurity.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

DarkLight

DarkLight

DarkLight Cyio is an AI-powered cyber risk solution that applies real-time threat intelligence and business context to risk prioritization.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

ISAGCA is a collaborative forum to advance OT cybersecurity awareness, education, readiness, and knowledge sharing.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

eXate

eXate

eXate provides pioneering technology that empowers organisations to protect, control and manage their sensitive data centrally, providing a complete data privacy solution.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Entech

Entech

Entech is a managed IT service provider. We work behind the scenes on your network to ensure data security and integrity.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

CompassMSP

CompassMSP

CompassMSP deliver Managed IT and cybersecurity solutions designed to unleash your business's full potential.

FOSSA

FOSSA

FOSSA is a leading SBOM (software bill of materials) and software supply chain risk management platform.