FREE TO VIEW


« Back to News

2018-05-11

Learning About Russian Hackers

There is a long-held suspicions among western governments that Russia is stepping up its hostile cyber capabilities.

2018-03-27

Five Steps To Keeping Your Cloud GDPR Compliant

The GDPR gives the balance of power concerning personal data to the individual rather than companies collecting it. That could be painful.

2018-03-27

LinkedIn Updates Policies For GDPR

LinkedIn is making changes that will impact the user agreement, privacy policy, cookie policy and professional community policies in time for GDPR.

2018-03-26

Equifax: Insider Trading Charges

An Equifax executive faces charges of insider trading based upon confidential information about a data breach affecting data of 140 million people.

2018-03-26

Petty Criminals Have Use Of Sophisticated Hacking Tools

The experts at Cyberint say that hackers have started using sophisticated hacking tools and techniques once used only by nation states.

2018-03-26

UK Police Helping Business Fight Cyber Attacks

London's Metropolitan Police offer an innovative new exercise that teaches business leaders how to protect their companies from cyber-attacks.

2018-03-26

The Resurgent Cyber Threat From Iran

Iran's army of hackers are emboldened and skilled at carrying out surveillance operations and sophisticated attacks beyond its borders.

2018-03-23

Russia Can Disconnect From The Internet

Russia has prepared the infrastructure to support a digitally isolated state, capable of operating independently from the World Wide Web.

2018-03-23

Crypto Mining Malware Hits Business

Crypto-mining malware continues to impact organisations globally as 23% were affected by the Coinhive variant during January, say Check Point.

2018-03-22

Slingshot: Avoiding Sophisticated Cyber Espionage

Kaspersky has discovered a highly sophisticated cyber espionage campaign that spreads through compromised routers and can remain undetected.

2018-03-21

Cambridge Analytica Claim To Sway Elections With Facebook Data

If Cambridge Analytica can sway elections using a relatively small subset of Facebook’s data, what can Facebook do with the full set?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Monster Jobs

Monster Jobs

Monster is a global leader in connecting people to jobs, wherever they are. Monster covers all job sectors including cybersecurity in locations around the world.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.

Oak9

Oak9

Oak9's Security as Code platform dynamically secures Infrastructure as Code (IaC) and deployed cloud workloads, automatically.

Team Burkhart

Team Burkhart

Team Burkhart, a proud member of the Apple Consultant Network, is a leader in managed IT and security services, serving clients across the Midwest and beyond.