FREE TO VIEW


« Back to News

2020-08-04

The Cyber Security Threat From Employees

Human errors are the leading cause of data and security breaches as they are not predicable, whereas computers & technology are predictable.

2020-08-04

China's Surveillance State Extends Beyond Its Borders

The Chinese state is widely using technology not only to track its own citizens, but to exert power beyond its borders by espionage and theft.

2020-08-04

Secret Brexit Documents Hacked By Russians

Russian hackers stole classified documents relating to US / UK post-Brexit trade talks, which were then used in the 2019 General Election.

2020-08-03

Reducing Exposure To Cyber Attack

Strengthening your organisation's defences is about reducing the attack surface and eliminating insider errors, making it much harder to break in.

2020-08-03

European Union Sanctions Cyber Attackers

The EU imposes sanctions on targeted individuals and entities from Russia, China and North Korea in a sign that it is taking cyber warfare seriously.

2020-08-03

Hackers Breach Cisco Security Network

Cisco reveals a high-severity flaw in its network security software allowing remote, unauthenticated attackers to access sensitive data.

2020-08-03

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Understanding adversary tactics & techniques based on real-world observations are critical to building effective threat detection capabilities.

2020-07-31

#BLM Targeted By Racist Cyber Attacks

Black Lives Matter is at the centre of a national conversation about race, racism, and policing, making it a special target for hackers and trolls.

2020-07-31

The Costs Of A Data Breach

The total cost of a data breach to a major business has reached a whopping $3.9m. It's not just money - reputation, credibility and trust are at stake.

2020-07-30

Women In Cyber Security Are Paid Much Less Than Men

There is still a shortage of women in the global cyber security workforce - not least because they are paid 21% less than men doing the same job.

2020-07-30

Hollywood Site Leaks Personal Data Of 260,000 Actors

The information exposed includes full profiles of over 260,000 users along with very sensitive personal information and access to photographs.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

Protegrity

Protegrity

Protegrity is an enterprise and cloud data security software for data-centric encryption and tokenization to protect sensitive data while maintaining usability.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

QuoIntelligence

QuoIntelligence

QuoIntelligence experts can help your team understand the evolving cyber threats and provide simple yet comprehensive recommendations so you can focus on what matters.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

QANplatform

QANplatform

QANplatform is a Quantum-resistant hybrid blockchain platform.

CyPro

CyPro

CyPro is a cyber security expert firm that specialises in providing cyber security services tailored for high-growth companies at every stage of their journey.

Axoflow

Axoflow

Axoflow helps organizations to consolidate their existing solutions for logs, metrics, and traces, and evolve them into a cloud native observability infrastructure.