FREE TO VIEW


« Back to News

2020-06-22

Is AI A Benefit Or A Potential Threat?

As Artificial Intelligence grows more sophisticated, concerns about the challenges its widespread use presents to humans are growing.

2020-06-22

Twitter Is Trying To Control Propaganda

Twitter has removed tens of thousands of "state linked" accounts used by China, Russia and Turkey to promote fake news.

2020-06-22

Cyber Threats Are The Top Insurance Risk

Cyber crime is a leading threat to business and the Insurance industry is now focused on the potentially huge losses arising from ransomware.

2020-06-22

Inside The Deep & The Dark Web

The Deep Web and the Dark Web are inaccessible and widely misunderstood - they are not the same thing. What is really going on there?

2020-06-19

The Future Of Ransomware Is In The Cloud

Ransomware has become a multibillion dollar industry for cyber criminals, who are staring to focus on the fast-growing Cloud computing sector.

2020-06-18

Blame The Boss For Cyber Attacks

More than a third of British consumers would see a business leader as personally responsible if that business were to suffer a data breach.

2020-06-17

Hackers Are Targeting Coronavirus Research

State-backed cyber attackers are trying to steal data from universities and research institutes involved in coronavirus vaccine research.

2020-06-17

Your Phone Is Spying On You

Forget about the privacy of Coronavirus tracing Apps. Your new mobile phone comes straight from the factory with pre-installed spyware ready to go.

2020-06-17

Maritime Cyber Attacks Quadruple

Ageing shipping infrastructure, complex supply chains and the effects of lockdown combine to make the shipping industry highly vulnerable.

2020-06-17

Managing Your Cyber Security, Detection & Response

Data has become a new currency and managing detection and response to IT systems threats is now critical for non-technical senior managers.

2020-06-16

Britain Is Wide Open To Cyber Spying

Espionage against the UK is both wide reaching and significant and the Centre for Protection of National Infrastructure is one part of the response.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

WISeKey

WISeKey

WISeKey is a leading cybersecurity company currently deploying large scale digital identity ecosystems for people and objects using Blockchain, AI and IoT.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

Research Institute in Secure Hardware and Embedded Systems (RISE)

Research Institute in Secure Hardware and Embedded Systems (RISE)

The UK Research Institute in Secure Hardware and Embedded Systems (RISE) seeks to identify and address key issues that underpin our understanding of Hardware Security.

Gula Tech Adventures

Gula Tech Adventures

Gula Tech Adventures invests in companies and nonprofits that help close the gap in needed technology and workforce to defend the country in cyberspace.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.

Defence Labs

Defence Labs

Defence Labs is a cybersecurity company specialising in cost effective penetration testing for small-to-medium sized enterprises.

Cyver Core

Cyver Core

Cyver Core is a pentest management and pentest report automation platform that consolidates cybersecurity work, automates overhead, and frees cybersecurity professionals up for the work that matters.

Forsyte IT Solutions

Forsyte IT Solutions

Forsyte Guardian 365 provides 24x7x365 personalized protection to keep your most valuable assets safe.