FREE TO VIEW


« Back to News

2020-04-07

The US Has A New 5G Security Strategy

The US intends to protect its fifth-generation wireless infrastructure at home and overseas and President Trump has laid out his plan to do so.

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-04-06

Zoom-Bombing Hijackers

FBI Warning: Unwanted guests intruding on video conferences for malicious purposes has significantly increased during the pandemic.

2020-04-03

Fighting Fake News With Cyber Intelligence

The EU and Canada are tracking a blizzard of fake news about the impact of the Coronavirus which originates from Russian and Chinese sources.

2020-04-01

Beware Spoofing Attacks

Spoofing Is No Joke: Eleven types of spoofing attack that every security professional should know about. By David Balaban

2020-04-03

WEBINAR: How to design a least privilege architecture in AWS

Tuesday, April 14, 2020 | Join SANS and AWS Marketplace to learn about how to design a least privilege architecture in AWS.

2020-03-31

Stay Cyber-Secure Working From Home

People working from home are a lot more vulnerable than inside a secure office environment - Here is advice for workers and their employers.

2020-04-03

Universities That Teach Cyber Security At Risk

Leading universities in Britain and the US that teach and research Cyber Security are finding that they are themselves subject to a range of attacks.

2020-04-02

Artificial Intelligence, Automation, Training & Jobs

The emergence of AI and Automation pose a new set of opportunities and challenges for the nature of work and for workers themselves.

2020-03-31

The US Is Facing A Catastrophic Cyber Attack

The US is “dangerously insecure in cyber,” and needs to take a series of actions to avert attacks on critical infrastructure & financial services.

2020-04-06

Container Shipping Gets A Cyber Security Mandate

Detailed guidance is released to ship-owners and sea-going vessels to get them ready for new international maritime cyber security rules.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

ThreatAware

ThreatAware

Total visibility of your business cybersecurity. Monitoring, management and compliance for your cybersecurity tools, people and processes from one easy to use dashboard.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

IgmGuru

IgmGuru

Igmguru offers certification online training courses for IT professionals and students. Get certified with high-in-demand job-oriented professional courses.

Serbus

Serbus

Serbus Secure is a fully managed suite of secure communication, enterprise mobility and mobile device security tools.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.