NEWS > Cybersecurity News


« Back to News

2020-03-13

The Most Common Cyber Attacks

Over 32% of UK businesses identified an attack over last 12 months and 22% of charities reported they were attacked over the same period.

2020-03-12

Cyber Security Strategy In The Digital Age

The security posture of a company is now just as important to the CEO as it is to the CISO. Business leaders must embrace this reality.

2020-03-11

Cyber Crime Methods Are Evolving

Criminals are quickly developing new tools and techniques to take advantage of changes in the ways consumer and businesses behave.

2020-03-11

The Global Cyber Security Market Will Be Worth $280b By 2027

The cybersecurity market is booming: The cyber hotspot continues to attract founders and investors alike, with 300+ new startups launching every year.

2020-03-10

The Cyber Security Workforce Must Grow 145%

Although cyber security training is increasing there remains an acute skills shortage and the expert cyber workforce urgently needs to get bigger.

2020-02-26

Cyber Security Warnings For US 2020 Election

Security experts warn that government agencies are under attack and that hackers are very likely to focus on the forthcoming US Presidential election.

2020-03-10

90% Of Breaches Are Caused By Human Error

Analysis of data from the UK Information Commissioner’s Office shows that human error caused 90% of data breaches last year.

2020-03-04

Cyber Crime Is Over 50% Of All Reported Crime

Cyber crime is running rampant and Police and other law enforcement often do not to pursue online criminals, or have the resources to do so.

2020-03-02

The New Battlefield

The nature of warfare is changing and the risk is moving from physical disruption to a much more complex and unpredictable cyber environment.

2020-02-24

Sustained Cyber Attacks Are The New Normal

Some businesses are adjusting to the ‘new normal’ of sustained cyberattacks, but there is much more to be done to protect your organisation.

2020-02-19

The Cloud Is Beginning To Attract Criminal Extortion

Mistakes made while setting up cloud permissions and policies create weak spots that attackers can exploit to deliver ransomware.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Fidus Information Security

Fidus Information Security

Fidus is a team of security professionals providing Penetration Testing and Cyber Security Consulting services throughout the UK and worldwide.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

SynerLeap

SynerLeap

SynerLeap is ABB's innovation growth hub. Our aim is to help startups accelerate and expand across industries, ranging from industrial automation and robotics to grid technologies and smart cities.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Fescaro

Fescaro

FESCARO is a trusted cybersecurity partner for global automakers and their partners, helping them transition to software-defined vehicles (SDVs) with tailored automotive software solutions.

NVT Phybridge

NVT Phybridge

NVT Phybridge is a global leader in Power over Ethernet (PoE) switches and extender solutions.