NEWS > Cybersecurity News


« Back to News

2019-12-16

What Girls Bring To Cyber Security

Some educators think that females have particular skills to bring to cyber security and schools in New Jersey, US and Cardiff, Wales, back this up.

2019-12-16

Cybercrime’s Deadly Impact On Business

A single successful attack can seriously damage your business, cost big money, burden your customers and affect your business's reputation.

2019-12-10

Can Small Business Beat Cyber Attacks?

A good cybersecurity strategy is essential for any business, no matter its size, but with the severe skills shortage, what’s a small business to do?

2019-12-06

Creating A Cyber Incident Response Policy

Incident response is an organised approach to addressing and managing the aftermath of a security breach or cyberattack. You might need it.

2019-12-06

Beware Phishing Emails

Phishing is one of the most longstanding and dangerous methods of cybercrime. It is a simple fraud to operate and consistently claims victims.

2019-12-06

Free Speech And The Detention Of Julian Assange

Is Julian Assange a journalist and is journalism a crime? Yes and No, say those who oppose his extradition to the US on spying changes.

2019-12-04

Russia’s AI Mission Is State-Driven

Russia's recognition of the strategic significance of Artificial Intelligence is taking shape and it appears to be focusing on military applications.

2019-12-02

Using The Right Technology Saves Downtime From Cyber Attacks

Business Leaders Beware: Organisations face increasingly sophisticated cyber-attacks which are impossible to anticipate using traditional methods.

2019-12-02

On Trend: Business Data Protection Laws

Eighty countries worldwide have now adopted strict data protection laws to prohibit misuse of private information. Business must react.

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

2019-11-26

More Women Should Engage In Cyber Security Jobs

History is filled with women leaders in Science and Technology, which is why it’s puzzling that only 20% of the cyber security industry is female.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Cymulate

Cymulate

Cymulate is a SaaS-based breach and attack simulation platform that makes it simple to know and optimize your security posture any time, all the time.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Zix

Zix

Zix offers secure email encryption, threat protection, archiving, DLP and BYOD security for hospitals, financial services, government, and more.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

UMBRA

UMBRA

UMBRA is solely concerned with protecting governments against Nation State attacks. We are not a consumer or enterprise company.

Binary Defense

Binary Defense

Binary Defense protect businesses of all sizes through advanced cybersecurity solutions including Managed Detection and Response, Security Information and Event Management and Counterintelligence.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Dectar

Dectar

Dectar (formerly 4Securitas) is a cybersecurity company that provides solutions that predict, detect, defend and react against cybersecurity threats.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

BastionZero

BastionZero

BastionZero is leveraging cryptography to reimagine the tools used to manage remote access to servers, containers, clusters, applications and databases across cloud and on-prem environments.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Resilience Cyber insurance

Resilience Cyber insurance

Resilience helps to improve cyber resilience by connecting cyber insurance coverage with advanced cybersecurity visibility and a shared plan to reinforce great cyber hygiene.

Fletch

Fletch

Fletch’s AI tracks the evolving cybersecurity threat landscape by reading and interpreting every threat article every day and matching those threats to a company’s exposure.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.