FREE TO VIEW


« Back to News

2020-12-20

Tech Support Scams Steal Millions

Criminals are cold calling victims, pretending to be from reputable ISPs, claiming that the victim has a problem with their computer or internet.

2020-12-18

The End Of The American Cyber Empire

Russia has accomplished the goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. By Ronald Marks

2020-12-18

Russian Hackers Have Stolen US Secrets

Some of The USA's most deeply held secrets may have been stolen by Russian government hackers in a heavy multi-pronged attack just revealed.

2020-12-17

Business Cyber Security Spending In 2021

Although more exposed than ever, PWC say that 25% of organisations are planning to downsize their cyber budgets in the forthcoming 12 months.

2020-12-16

Europol Warning Of The Growing AI Cyber Threat

AI will become increasingly popular among cyber criminals who are beginning to use it to target their victims and to maximise hacking operations.

2020-12-16

Practice Makes Protected – CYRIN’s Tools Packages

BRAND NEW! – See the New Cyber Tools Packages from CYRIN – Find out about CYRIN's virtual cyber range. Get Your Free Trial.

2020-12-15

E-Businesses That Don’t Require Employees

Starting a business that doesn't require employees keeps overhead expenses down and intelligent use of Technology makes a really big difference.

2020-12-15

Insider Security Risk Soars During Lockdown

User behavior under lockdown is a dominant risk and 58% of IT professionals believe employees might ignore security rules and put data at risk.

2020-12-15

The Personal Data Being Used To Get Your Vote

Everything about you, from your phone number to your salary and home address, is collected and traded by political campaigns and consultants.

2020-12-14

Ethiopian Telecoms System Has Critical Security Flaws

A white-hat hacker has found critical security flaws in Ethiopia’s mobile telecom network that would allow hackers to control the entire system.

2020-12-14

US Government Agencies Under Attack

CISA issues an emergency warning that nation-state hackers have weaponise software used by many federal agencies and leading businesses.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Knowledge Lens

Knowledge Lens

Knowledge Lens builds innovative solutions on niche technology areas such as Big Data Analytics, Data Science, Artificial Intelligence, Internet of Things, Augmented Reality, and Blockchain.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

HTL Support

HTL Support

HTL Support, your trusted partner for comprehensive IT support in London. We specialize in delivering top-tier IT solutions tailored to both large enterprises and small businesses.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.

GrayHats

GrayHats

GrayHats is a platform-based cybersecurity company devoted to delivering comprehensive, scalable, and proactive protection for businesses in an ever-evolving threat landscape.