FREE TO VIEW


« Back to News

2020-05-12

Effective Cyber Security Training Using The GoCyber App

One of the major issues that all organisations face is the need for real time cyber training of their people. There's an App for that.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-05-04

British Government Advice Threatens Your Cyber Security

The UK National Cyber Security Centre (NCSC) is recommending that you save your passwords in your browser. We don't recommend it.

2020-05-01

Lockdown Security Apathy Could Be A Big Risk

Organisations are struggling to get employees to buy into cyber security with a third of IT leaders saying their remote workers simply don’t care.

2020-05-01

Quantum Computing Has Far Reaching Effects On Security

Quantum computers are capable of code-breaking applications that could pose major risks to the security of current communications systems.

2020-04-30

Webinar: How to implement a software-defined network security fabric in AWS

Thursday, May 14th | Join SANS & AWS to learn how implementing an SDN can enhance visibility & control across multiple VPCs in your network.

2020-04-29

Massive Business Cost Savings With Effective Cyber Security

Cynapse calculate that UK business can save up to 40%, worth £1.3b, by shifting a proportion of their cybersecurity work to smaller innovative firms.

2020-04-29

Why Is The Skills Shortage So Big?

Companies need to keep their critical data secure, but the growing shortage of qualified cybersecurity professionals is making it difficult.

2020-04-29

Ransomware Authors Go Beyond Malicious Encryption

Ransomware is mutating into a phenomenon with two-pronged extortion at its core, adding data theft to the threat of blackmail. By David Balaban

2020-04-28

Q1 2020: Key Trends In Cyber Security

The worldwide response to Covid-19 is not the whole story for cyber security so far this year and there are some other significant emerging trends.

2020-04-28

Every Single Employee Requires Cyber Security Training

Businesses investing in cyber security often base their investments on technology, but fail to attend to the human side of the problem with training.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Sentryc

Sentryc

Sentryc provides automated monitoring of brands on online marketplaces and social media making online brand protection processes faster, more clearly structured and more efficient.

Minorities in Cybersecurity (MiC)

Minorities in Cybersecurity (MiC)

MiC was developed out of a unique passion to help fill the gap that exists in the support and development of women and minority leaders in the cybersecurity field.

Flawnter

Flawnter

Flawnter is a security testing software that finds hidden security and quality flaws in your applications.

Triskele Labs

Triskele Labs

Triskele Labs deliver services including Penetration Testing, Compliance and Risk Management through to 24*7*365 Security Operations and outsourced Cybersecurity Managers.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.