NEWS > Cybersecurity News


« Back to News

2020-03-04

Cyber Crime Is Over 50% Of All Reported Crime

Cyber crime is running rampant and Police and other law enforcement often do not to pursue online criminals, or have the resources to do so.

2020-03-02

The New Battlefield

The nature of warfare is changing and the risk is moving from physical disruption to a much more complex and unpredictable cyber environment.

2020-02-24

Sustained Cyber Attacks Are The New Normal

Some businesses are adjusting to the ‘new normal’ of sustained cyberattacks, but there is much more to be done to protect your organisation.

2020-02-19

The Cloud Is Beginning To Attract Criminal Extortion

Mistakes made while setting up cloud permissions and policies create weak spots that attackers can exploit to deliver ransomware.

2020-02-20

The New Wave Of Attack Vectors

Be Prepared: As cyber attacks grow constantly more sophisticated, top industry experts describe the latest wave of attack vectors to look out for.

2020-02-17

British CEOs Worry About Cyber Attacks While Their Businesses Are Under-Insured

Surveys suggest that cyber threats are top of the most pressing risks facing UK businesses leaders, yet less than 20% have a cyber insurance policy.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2020-02-17

GDPR's Impact In The US And Globally

Outside of the European Union you might think that it doesn’t apply to you, but GDPR affects organisations and businesses worldwide.

2020-02-17

The Human Effect On AI Security

Although innovations in ArtificiaI Intelligence are transforming cybersecurity, the key high level aspects remain essentially human.

2020-02-17

Labour Party Risks £15m Fine For Not protecting Members' Data

Accusations of dirty tricks are flying in the British Labour Party leadership contest as competing factions claim illegal access to membership data.

2020-02-17

It Was The Chinese Army That Hacked Equifax

The Justice Dept. has charged four Chinese army officers for the attack on Equifax that stole the personal information of 145 million US citizens.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Span

Span

Span designs, develops and maintains information systems based on advanced technological solutions of global IT leaders.

International Cybersecurity Institute (ICSI)

International Cybersecurity Institute (ICSI)

ICSI is a UK company offering specialized and accredited professional qualifications in cybersecurity for young IT graduates as well as mature professionals.

TAG Cyber

TAG Cyber

TAG Cyber's mission is to provide world-class cyber security research, advisory, and consulting services to enterprise security teams around the world.

Kinetic Investments

Kinetic Investments

Kinetic Investments is a venture capital firm dedicated to early-stage companies that are transforming the digital landscape.

nexSecurity

nexSecurity

neXSecurity is an IT and Information security consulting company with more than 2 decades worth of software development and security experience.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Halogen Group

Halogen Group

Halogen Group is the leading Security Solutions Provider in West Africa. Services encompass Physical Security, Electronic Security, Virtual & Cyber Security, Risk Assessments and Training.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Federal Bureau of Investigation (FBI) - USA

Federal Bureau of Investigation (FBI) - USA

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

National Centre for Digital Security (CNSD) - Peru

National Centre for Digital Security (CNSD) - Peru

The National Center for Digital Security manages and supervises the operation of Digital Security in Peru in order to strengthen digital trust.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.