FREE TO VIEW


« Back to News

2020-11-27

A ‘FunnyDream’ From China

Some senior corporate executives have been having nightmares about being hacked on their business trips in Asia. They're not just dreaming.

2020-11-27

Cyber Security Has Become Critical For National Security

Critical national infrastructure, both public and private, is increasingly interconnected and has become susceptible to predatory cyberattacks.

2020-11-26

Donald Trump Had His Twitter Account Hacked

A Dutch cyber investigator has claimed he gained access to Donald Trump's Twitter account with the password 'MAGA2020!' Police are investigating.

2020-11-26

How The Internet Has Transformed Our Lives

Those born after 1990 may not realise the profound effects of the Internet on almost every aspect of modern life. Both good and bad.

2020-11-25

Coming Soon: Regulation Of Social Media

If the 'informational chaos' of Social Media is a threat to democracy, then might its regulation by governments be a threat to free speech?

2020-11-23

Outsourced Cyber Spying

Spying As A Service: Outsourcing an espionage campaign against your competitors to a specialist hacking group is now a practical proposition.

2020-11-21

Attack & Defence At Manchester United Football Club

One of the leading British Premiership Football clubs has suffered a sophisticated cyber attack, but they claim to have responded swiftly.

2020-11-21

Remote Working: Five Best Ways To Prevent A Data Breach

Remote teams play a critical role in the success of many companies and business leaders must be mindful of the underlying risk of data breaches.

2020-11-20

Why Real-Time Data Matters To The Maritime Industry

Maritime companies are using Big Data tools and Cloud-based sytems to drive operational efficiency. Keeping the data secure is a big issue.

2020-11-23

SANS Book: Practical Guide to Security in the AWS Cloud

SANS' Practical Guide to Security in the AWS Cloud. Tactics, techniques and procedures for securely operating in the cloud. Download Now

2020-11-19

CYRIN Cyber Alert - Test-Drive The CYRIN Cyber Range

Real Tools, Real Attacks and Real Scenarios that provides hands-on training and experience for IT Engineers and Cyber Security Defenders.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Cybil

Cybil

Cybil is a publicly-available portal where members of the international cyber capacity building community can find and share information to support the design and delivery of programs and projects.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance (MCSA)

Midwest Cyber Security Alliance is a nonprofit, nonpartisan collaboration of individuals, businesses, government entities, and professionals advocating for more effective cyber security solutions.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Orca Tech

Orca Tech

Orca Tech brings together a portfolio of complimentary vendor in the IT security industry to help provide a complete solution to meet the requirements of our Partners across all sectors.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.

Pacific Northwest National Laboratory (PNNL)

Pacific Northwest National Laboratory (PNNL)

PNNL draws on its distinguishing strengths in chemistry, Earth sciences, biology, and data science to advance scientific knowledge and address challenges in energy resiliency and national security.