FREE TO VIEW


« Back to News

2017-04-19

Safeguard Data When Employees Leave

Employee turnover comes with a variety of corporate, logistical and financial hurdles, they also create data protection & security problems.

2017-04-19

London Terrorist Attack Is A Wake-Up Call For Social Media

London Police Chief warns social media giants Facebook, Google & Twitter to 'put their house in order' following the deadly attack on Westminster.

2017-04-19

Stop Data Breaches, Start With Databases

A common source for numerous large scale data breaches are poorly secured databases that connect directly to the internet.

2017-04-19

Russian Propaganda Connections

Fake news stories are generated by unrecognisable websites using anonymous sources, hoping to be picked up by mainstream media.

2017-04-18

Cyber War Calls For A New Look US Soldier

Passing basic training and a drugs test: The best cyber warriors don’t always make the best soldiers.

2017-04-18

Ageing Energy Systems Hold Huge Potential For Cyber Attack

The systems that run the US electricity grid, gas pipelines & other critical infrastructure have 25 years’ worth of vulnerabilities that need fixing.

2017-04-18

WikiLeaks Has Published The CIA’s Secrets For Infecting Windows

Wikileaks' release of CIA secret hacking tools includes software to build customised malware to compromise computers running Windows.

2017-04-18

Facebook Accused Of Publishing Child Pornography

Facebook is at risk of prosecution in Britain for refusing to remove potentially illegal terrorist and child pornography content.

2017-04-18

French State Hackers Get Ready For Cyber Warfare

France has a plan to train a new cadre of cyber experts to counter attacks on critical infrastructure and other attempts at digital destabilization.

2017-04-14

Insurers Get Much More Cautious About Cyber Risk

Major US insurer Anthem wants reviews of PC usage by customers seeking damages as it may be solely their client’s fault.

2017-04-14

Half Of All Canadian Businesses Hacked

Fifty percent Of Canadian bosses say that they know for certain that their company experienced a breach. A further 10% thought they probably had.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Cloudmark

Cloudmark

Cloudmark is a trusted leader in intelligent threat protection against known and future attacks, safeguarding 12 percent of the world’s inboxes from wide-scale and targeted email threats.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

ShadowDragon

ShadowDragon

ShadowDragon develops digital tools that simplify the complexities of modern investigations that involve multiple online environments and technologies.

Asoftnet

Asoftnet

Asoftnet are specialists in IT security, IT forensics, IT service, websites, applications and mobile solutions.

VerSprite

VerSprite

VerSprite is a specialist information security consulting firm. We provide organizations with detection across all their attack surfaces and deliver critical insight into all possible attack methods.

National Accreditation Agency of Ukraine (NAAU)

National Accreditation Agency of Ukraine (NAAU)

NAAU is the national accreditation body for Ukraine. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Metallic.io

Metallic.io

Metallic (formerly TrapX) is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and other threats.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

HardTarget

HardTarget

HardTarget is a cutting-edge cyber training company serving HWN (High-Net-Worth) Families and their trusted Advisors.