FREE TO VIEW


« Back to News

2020-06-27

Companies Are Coughing Up Ransom To Recover Their Data

One in six of those attacked with malware have surrendered by paying out the ransom following a data breach. One firm paid over £70million.

2020-06-27

Amazon Web Services Fights Off Massive DDoS Attack

Amazon's online cloud, which provides the infrastructure on which many websites rely, has defended itself against the largest DDoS attack ever.

2020-06-26

How Hackers Invade Your Computer

Hacking attempts are aimed at the most vulnerable, insecure computers that can be hijacked and used to launch many other attacks.

2020-06-26

Global Cyber Security Spend To Grow Only 2.8%

Gartner say Cyber Security spending will grow less fast in 2020 as CIOs focus on “mission-critical” services to cope with the looming recession.

2020-06-25

Cyber Security Warnings From The Coronavirus Pandemic

The coronavirus has accelerated a remote working culture and compliance policies written for the workplace need to reflect this new remote reality.

2020-06-25

First Winners Of £10m British Cyber Security Fund

Universities in Glasgow and Birmingham will share a £10million investment fund aimed at reducing errors and security flaws targeted by hackers.

2020-06-24

Fake Qantas Facebook Page Promises Free Flights

Qantas has been at the centre of a scam on Facebook after free first class flights were offered on a fake account on the social network.

2020-06-24

Australia Assaulted By Severe State-Backed Cyber Attacks

Australia has not directly accused China and yet the scale, nature of the targeting and the signature methods used all point one direction.

2020-06-23

Beware Trojan Mobile Banking Apps

The FBI advises users to exercise extreme caution when downloading banking Apps to mobile devices, as they could hide 'malicious intent'.

2020-06-23

Using AI In Cyber Security

Advanced Artificial Intelligence and Machine Learning tools are becoming increasingly critical in detecting and combating cyber attacks.

2020-06-23

Some Employees Think They Can Dodge Cyber Security

The serious damage data breaches cause is encouraging businesses to re-examine their cybersecurity and to change employee behaviour.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

FourthRev

FourthRev

FourthRev is an education-technology start-up with a mission to solve the skills crisis of the Fourth Industrial Revolution.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

ZILLIONe

ZILLIONe

ZILLIONe is one of Sri Lanka´s top enterprise technology solutions providers.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

ExactTrak

ExactTrak

ExactTrak provide embedded cyber security solutions for your digital devices – whenever and wherever you need them.

SureCloud Cyber Services

SureCloud Cyber Services

Our Cyber Testing capability has been honed since we were founded in 2006 as a disrupter in the penetration testing market.

Orca Fraud

Orca Fraud

Orca is an AI-driven fraud orchestration platform. We empower fraud fighters to outpace fraud using our custom ML models.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.