NEWS > Cybersecurity News


« Back to News

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-06

Russia’s Strategy For Information Warfare

Information Warfare: Its not just about hacking devices, shutting down pipelines and stealing data. Russian strategy is more subtle and stealthy.

2021-09-03

The Cyber Security Market Is Booming

The global cyber security market size was valued at $167 billion in 2020 and is expected to grow 11% year on year for at least the next five years.

2021-08-26

Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution

The storage & processing of massive quantities of internet data sparked the simultaneous usage of big data and cloud computing. By Ryan Jason

2021-08-24

Businesses Pay A High Price For Automated Bots

Automated bots operated by criminals are costing businesses an average of 3.6% of their annual revenue and can remain undetected for months.

2021-08-16

New Ransomware Variant Discovered

DeepBlueMagic: Heimdal Security experts have warned of a complex new ransomware variant more innovative than other encryption exploits.

2021-08-16

Norton To Pay $8bn To Buy Avast

US cyber security giant NortonLifeLock announces that it will buy its Czech rival Avast for over $8 billion, creating a business with 500m users.

2021-08-12

Cyber Crime In 2025

The global cost of cyber crime could reach over $10 trillion by 2025. It's vital that governments & businesses invest in their cyber security.

2021-08-03

Nexperia - A Bigger Threat Than Huawei?

Britains largest computer chip manufacturer could be acquired by China's Nexperia, creating a "first order strategic issue" say cyber security experts.

2021-07-21

Russian National Security Strategy

The new strategy aims to promote Russian digital sovereignty and to counter the threat of foreign and domestic subversion with information warfare.

2021-06-23

Negotiating Ransom: To Pay Or Not?

Factors to consider when responding to a ransom demand include the readiness of your backup network & data, insurance and customer reaction.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Altaro Software

Altaro Software

Altaro provide backup solutions that are intuitive, easy to use, well-priced and backed by outstanding 24/7 support as part of the package.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies (BGSW)

Bosch Global Software Technologies offer an advanced innovation for AI security. The Bosch AIShield is the definite answer to safeguard your business against model extraction attacks.

63Sats Cybertech

63Sats Cybertech

63SATS is the cybersecurity business unit of 63 Moons Technologies, a world leader in providing next-generation technology ventures, innovations, platforms, and solutions. 

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.

Keeran Networks

Keeran Networks

Established in Edmonton in 1999, Keeran specializes in delivering comprehensive IT support and solutions aimed at optimizing technology investments for businesses.

INTfinity Consulting

INTfinity Consulting

The INTfinity team brings together decades of professional experience in cybersecurity. We're here to apply that same experience and proficiency in defending your networks.