NEWS > Cybersecurity News


« Back to News

2020-06-25

Cyber Security Warnings From The Coronavirus Pandemic

The coronavirus has accelerated a remote working culture and compliance policies written for the workplace need to reflect this new remote reality.

2020-06-22

Cyber Threats Are The Top Insurance Risk

Cyber crime is a leading threat to business and the Insurance industry is now focused on the potentially huge losses arising from ransomware.

2020-06-22

Inside The Deep & The Dark Web

The Deep Web and the Dark Web are inaccessible and widely misunderstood - they are not the same thing. What is really going on there?

2020-06-19

The Future Of Ransomware Is In The Cloud

Ransomware has become a multibillion dollar industry for cyber criminals, who are staring to focus on the fast-growing Cloud computing sector.

2020-06-18

Blame The Boss For Cyber Attacks

More than a third of British consumers would see a business leader as personally responsible if that business were to suffer a data breach.

2020-06-03

Half Of Lockdown Remote Workers Ignore Cyber Security

Workers are taking more risks working online at home than they would at the office and 52% of employees believe they can get away with it.

2020-06-02

Home Working: Reduce The Cyber Risks

Without the security protections that office systems provide, like firewalls and blacklisted IP addresses, remote workers are vulnerable to attack.

2020-06-01

British Government Thinking Again About Huawei

The British government has hit reverse gear and may remove all Huawei-supplied equipment, both 4G and 5G, from the UK telecoms infrastructure.

2020-05-27

Internet Cable To Encircle Africa

2Africa: Facebook is building a 23,000-mile undersea cable to supply fast Internet to 16 countries that will triple Africa’s Internet capability.

2020-05-27

Cyber Attacks On British Business Every Minute

Connected businesses in the UK experienced on average 157,000 attacks each in the first quarter, which equates to more than one every minute.

2020-05-26

Hacked ChatBooks Photo Data For Sale

Data consisting of 15 million user records has been stolen from a photo print service company and can now be found for sale on the Dark Web.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Soracom

Soracom

Soracom offers secure, scalable, cloud-native connectivity developed specifically for the Internet of Things.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Venrock

Venrock

Venrock helps entrepreneurs build some of the world's most disruptive, successful companies. We invest in technology: Security, Cloud Services, Big Data, Healthcare IT, AdTech.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

Concourse Labs

Concourse Labs

Concourse Labs Security Guardrails continuously verify cloud infrastructure and workloads. Continuously assess clouds for security, resiliency, and regulatory compliance.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision Cybertechnologies & Digital Solutions (Precision-Cyber)

Precision-Cyber was founded on the philosophy of state-of-the-art cybersecurity and digital solutions. Our guiding principle is simply that we will provide and secure all your digital needs.

Amtivo Ireland

Amtivo Ireland

Amtivo Ireland (formerly Certification Europe and EQA) offers a range of certifications and related services.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

Ory Corp

Ory Corp

Ory's IAM/CIAM solutions are designed to empower businesses with the tools they need to protect their users, services and things, and maintain compliance.