NEWS > Cybersecurity News


« Back to News

2020-12-22

The Different Types of Malware

Business owners must be aware of the implications of different types of malware and how to protect their company. By Ashley Lukehart

2020-12-20

Tech Support Scams Steal Millions

Criminals are cold calling victims, pretending to be from reputable ISPs, claiming that the victim has a problem with their computer or internet.

2020-12-18

The End Of The American Cyber Empire

Russia has accomplished the goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. By Ronald Marks

2020-12-18

Russian Hackers Have Stolen US Secrets

Some of The USA's most deeply held secrets may have been stolen by Russian government hackers in a heavy multi-pronged attack just revealed.

2020-12-17

Business Cyber Security Spending In 2021

Although more exposed than ever, PWC say that 25% of organisations are planning to downsize their cyber budgets in the forthcoming 12 months.

2020-12-16

Europol Warning Of The Growing AI Cyber Threat

AI will become increasingly popular among cyber criminals who are beginning to use it to target their victims and to maximise hacking operations.

2020-12-15

E-Businesses That Don’t Require Employees

Starting a business that doesn't require employees keeps overhead expenses down and intelligent use of Technology makes a really big difference.

2020-12-15

Insider Security Risk Soars During Lockdown

User behavior under lockdown is a dominant risk and 58% of IT professionals believe employees might ignore security rules and put data at risk.

2020-12-09

Data Breaches: 40% of SME Employees Think They Will Be Blamed

A survey of office workers exposes the limited effectiveness of small business cyber security and the need for better employee awarenes & traiining.

2020-12-09

The Cause Of Amazon’s Cloud Outage

Poor configuration in one AWS data centre spilled over to affect numerous large Amazon corporate customes, knocking cloud based services offline.

2020-12-09

We Live In A Transient Internet

The Internet's capacity for privacy has dissolved with the arrival of social media, but some say the loss of anonymity might not be such a bad thing.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

Operational Center for Information Systems Security (COSSI)

Operational Center for Information Systems Security (COSSI)

COSSI is responsible for the detection and mitigation of cyber attacks directed at French Government information systems.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Cowbell Cyber

Cowbell Cyber

Cowbell Cyber™ offers continuous risk assessment, comprehensive cyber liability coverage, and continuous underwriting through an AI-powered platform.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Texaport

Texaport

Texaport's vision is to be the trusted partner of choice for organisations seeking comprehensive IT management and cutting-edge security solutions.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

CyberNINES

CyberNINES

CyberNINES is a business specializing in helping US Department of Defense contractors become compliant and attest to federal cybersecurity regulation requirements.

Rocket Software

Rocket Software

Rocket Software helps customers in all industries solve their most complex IT challenges, across infrastructure, data, and applications — with solutions that simplify, not disrupt.