FREE TO VIEW


« Back to News

2020-12-29

The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit trade deal, but what does this mean for British cyber security?

2020-12-29

How to Close the Global Cybersecurity Skills Gap: Two Easy Steps

Although it seems a big challenge, closing the cyber security skills gap can be conducted with only two simple steps. By Jennifer Holland

2020-12-29

Is This The Hack Of The Decade?

Microsoft was hacked in the campaign against multiple US government agencies that took advantage of weaponised SolarWinds software.

2020-12-24

Major Cyber Attack On US Government Agencies Blamed On Russia

Secretary of State Pompeo has blamed Russia for what is being described as the worst-ever cyber espionage attack on the US government.

2020-12-23

You Should Prepare Your Organization For A DDoS Attack

DDoS attacks are very serious and are becoming even more costly. If you’re running a business, you have to know how to prepare for them.

2020-12-23

Plans To Divide US Cyber Command And The NSA

Outgoing Pentagon officials are seeking fast-track approval to divide the leadership of the National Security Agency and US Cyber Command.

2020-12-21

How To Optimize The DevSecOps Pipeline

DevSecOps is the method of applying essential security rudiments to the regular DevOps cycle through a coordinated effort.

2020-12-23

The SolarWinds Hack Can Directly Affect Industrial Control Systems

Sophisticated Russian hackers compromised SolarWinds' Orion platform, taking over control of IT infrastrucure & industrial control systems.

2020-12-22

The Different Types of Malware

Business owners must be aware of the implications of different types of malware and how to protect their company. By Ashley Lukehart

2020-12-24

The Impact of Covid-19 On Cyber Security Threats

The coronavirus pandemic of late 2019 and 2020 has changed the way some businesses will operate forever.

2020-12-21

Advanced Threat Detection And Response: Critical Steps

In every organisation it’s now critical to implement effective threat detection systems and respond to potential danger promptly. By Jennifer Holland

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

Advanced Software Products Group (ASPG)

Advanced Software Products Group (ASPG)

ASPG offers a wide range of innovative mainframe software solutions for Data Security, Access Management, System Management and CICS productivity.

Bugcrowd

Bugcrowd

As leaders in crowdsourced security testing, Bugcrowd connects companies and their applications to a crowd of tens of thousands of security researchers to identify critical software vulnerabilities.

Cyberint

Cyberint

Cyberint, the Impactful Intelligence company, fuses open-deep-and darkweb Threat Intelligence with Attack Surface Management to deliver maximum protection from external threats.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

BIRD Cyber

BIRD Cyber

BIRD Cyber is a program to promote collaboration on cybersecurity and emerging technologies aimed at enhancing the cyber resilience of critical infrastructure.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.