FREE TO VIEW


« Back to News

2019-11-13

WEBINAR: How to Build a Threat Hunting Capability in AWS

November 21 | Do you know how to build an effective threat hunting program in your AWS environment? Learn from SANS and AWS experts.

2019-10-28

The Next Industrial Revolution

A fusion of technologies is blurring the lines between the physical, digital and biological spheres. Its a revolution.

2019-10-28

Cyber Insurance Will Reshape Cyber Security

Insurance firms with the best understanding of cyber security risk will spur businesses to take the actions needed to withstand attacks.

2019-10-28

British Government Funds Chip Maker To Build Cyber Resilience

The UK is partnering with Arm to develop new chip technologies that are more resistant to cyber threats, backed by £36 million in funding.

2019-10-28

UK Workforce Lacks Basic Cyber Training

Over 75%of British workers surveyed say they have not had even basic training in cyber security. Over 25% use one password for multiple accounts.

2019-10-28

False Flag: Russian Hackers Hijack An Iranian Group

Russian hackers used Iranian cyber tools and digital infrastructure to attack government and industry groups in dozens of countries.

2019-10-25

Protect Your Organisation From Employee Data Theft

Too few organisations pay attention to the risk that their own employees present to data security, be it by accident or by intention.

2019-10-24

The Cyberthreat Handbook

Reading List: Thales and Verint have produced an analysis of the activities of approximately 60 major groups of cyber attackers throughout the world.

2019-10-24

Happy Days Ahead For 5G Hackers

Fifth-generation mobile networks are going live with greatly improved latency & bandwidth. They also offer hackers greatly more potential for attack.

2019-10-23

E-Passports Can Be Remotely Hacked

A newly discovered flaw in the chip contained in e- passports lets data thieves remotely scan the passport then track the holder’s every movement.

2019-10-23

Less Than Half Of Employees Get Regular Cyber Security Training

As techniques to exploit vulnerabilities continue to become more sophisticated, businesses must train their people to practice cyber security.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Darkscope

Darkscope

Darkscope is an award-winning personalised cyber intelligence service provider. Our cutting-edge AI and Deep Artificial Neural Networks lead the world of cyber intelligence solutions.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.