FREE TO VIEW


« Back to News

2018-06-06

Terrorists Deploy New Techniques To Counter Digital Forensics

Terror groups are using new and better techniques to hide data in computers and phones to reduce the intelligence value of seized laptops & phones.

2018-06-01

Florida Universities Launch A Joint Cyber Training Platform

The Florida Center for Cybersecurity will bring its virtual learning lab, called the CyberHub, to more public universities across the state this fall.

2018-06-03

Security University CyberSecurity Registered Apprenticeship Program

Security University Announces US Department of Labor Approval of Qualified/CyberSecurity Registered Apprenticeship Program

2018-06-02

InfoWatch Launches M. East Cyberecurity Training Centre

A new Middle East-based centre will provide education and advanced training in cyber security, IoT, big data, artificial intelligence and blockchain.

2018-06-05

Ridge Global Cybersecurity Institute launched

Ex - US Homeland Security Chief launches of the Ridge Global Cybersecurity Institute, a go-to source for all cybersecurity related services.

2018-06-05

Cybercrime: Law Enforcement Must Get Serious

A crime is crime, whether the bad actor is throwing a brick or wielding a keypad. Police should treat online crimes and physical crimes the same.

2018-06-05

Playing Catch-Up With GDPR

Beyond the EU the GDPR regulation is expected to reshape how global organisations manage, share and protect their users’ personal data.

2018-06-05

Demand For Indian Cybersecurity Skills Rising Fast

A side effect of GDPR is to promote a surge in demand for cybersecurity skills in outsourced IT centres in India.

2018-06-04

Malta Under Large Scale Attack

As a well known offshore banking centre for Russian nationals, it is perhaps no surprise that Malta suffers a high number of cyber attacks.

2018-06-04

Action Fraud Reports A Sharp Rise In Fake TSB Activity

The UK online crime reporting service is seeing a big jump in suspicious messaging connected with the stricken customer IT systems of TSB Bank.

2018-06-04

Nation State Cyber Attacks Are An Act Of War

Top British law officer thinks hostile states targeting essential infrastructure & services should be treated in the same way as physical attackers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NQA Certification

NQA Certification

NQA provides certification to a range of ISO standards including ISO 27001 for information security management.

Zadara Storage

Zadara Storage

Zadara provide complete data backup and protection delivered as a fully-managed service.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Liongard

Liongard

Liongard automates the management and protection of modern IT environments at scale for IT MSPs - Managed Service Providers and Enterprise IT Operations.

Duality Technologies

Duality Technologies

Duality Technologies combine Advanced Cryptography with Data Science to deliver High-Performance Privacy-Protecting Computing to Regulated Industries.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

M6iT Consulting

M6iT Consulting

M6iT Consulting is an industry-leading solution partner managing the IT requirements for a full range of companies.

Vulnify

Vulnify

At Vulnify, we’re revolutionizing the way businesses identify and manage security vulnerabilities.