FREE TO VIEW


« Back to News

2020-03-28

New Guidelines For Maritime Cyber Security

Cyber attacks on maritime freight may result in severe operational failures and new guidelines aim to contain threats from phishing emails & malware.

2020-03-27

Rapid Deployment Of 5G Is A Headache

The transition to 5G increases both the speed and volume of data communication, but there are a number of important issues which are problematic.

2020-03-26

AI Can Give An Early Warning Of Coronavirus

When applied to unstructured data, Artificial Intelligence is better at simulating disease spread than algorithms that rely on public health data.

2020-03-25

How Does The CCPA Compare To The GDPR?

Both the GDPR and the CCPA emphasize the need for companies to implement user privacy protection, but there are important differences.

2020-03-24

Fronton: A Secret Russian Tool To Shut Down The Internet

Russia's national spy agency has powerful new tools that can shut down internet services by tapping into IoT connected smart devices.

2020-03-23

How Effective Is Your Threat Intelligence?

Treat intelligence helps organisations make informed decisions on how to prepare for, identify and prevent threats to their cyber security.

2020-03-23

Covid-19 Virus Impacts Home Working

The C-19 virus is being increasingly used as a subject to engage readers with phishing emails and deliver a range of other attack vectors.

2020-03-23

Remote Working Is On Suddenly On Trend

The adoption of secure technology to enable the flexibility of working from multi-locations and online collaboration is suddenly urgent.

2020-03-20

Warning: Coronavirus Scams Surging

Right now, there are growing serious concerns about the threats posed by the current Coronavirus situation and the risk of online fraud.

2020-03-20

Redefining OSINT To Win The Cybercrime War

As the quantity & complexity of data increases and criminals become more creative, the investigations industry must urgently respond. By Julie Clegg

2020-03-13

Coronavirus And Your Phone

If you haven't cleaned your phone in a while, think twice before holding it up to your face the next time you have a phone call.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

SoSafe

SoSafe

SoSafe empowers organizations to build a security culture and mitigate risk with its GDPR-compliant awareness programs.

Healthcare Fraud Shield (HCFS)

Healthcare Fraud Shield (HCFS)

The focus of Healthcare Fraud Shield is solely on healthcare fraud prevention and payment integrity with a successful approach based on many unique advantages we deliver to our clients.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

IDX

IDX

IDX is the leading consumer privacy platform built for agility in the digital age.

Activu

Activu

Activu makes any information visible, collaborative, and proactive for people tasked with monitoring critical operations including network security.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Backslash Security

Backslash Security

With Backslash, AppSec teams gain visibility into critical risks in their apps based on reachability and exploitability.

PureSoftware

PureSoftware

PureSoftware is a global software products and digital services company that is driving transformation for the world’s top organizations across various industry verticals.

Chaos Computer Club (CCC)

Chaos Computer Club (CCC)

The Chaos Computer Club is Europe's largest association of hackers.

ThreatMate

ThreatMate

ThreatMate empowers businesses with comprehensive tools to detect, protect, and remediate against cyber threats.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.