TECHNOLOGY > Forensics


« Back to News

2015-07-20

The Most Damaging Ramifications of DDoS Attacks

Loss of customer trust & confidence are the most damaging consequences of DDoS attacks.

2015-07-13

Use Threat Intelligence to Boost Mobile Security

Security professionals recommend companies integrate threat intelligence about cyber security with mobile device management platforms.

2015-07-10

Data Scientist: The Sexiest Job of the 21st Century

Automated solutions, whether hardware or software, are getting cheaper, faster & more versatile at an ever-increasing rate.

2015-06-30

Cyberwars Between Nations Are Difficult to Prove

The OPM attack is merely the latest of a number of high-profile hacking attacks and attributing blame is a challenge.

2015-06-29

The Cybersecurity Company Helping Sony Fend Off Hackers

Bad news for everyone else is excellent news for those in the business of fighting such cyber villains.

2015-06-08

How to Stalk Someone’s Location on Facebook

A new tool lets you easily track movements of other Facebook users by scooping up location data shared in Facebook Messenger chats.

2015-06-08

Bigger than Heartbleed - 'Venom' Threatens Datacenters

Before Heartbleed: Worst vulnerabilities ever?

2015-06-04

Sophos to Raise £100m From Stock Market Float

SOPHOS IPO could be one of the London stock market's largest technology floats.

2015-05-19

Police Scotland Invests £1.5 million in Cybercrime Hub

A specialist investigation centre in Edinburgh to carry out forensic digital examinations in support of police investigations.

2015-05-12

There is No Secure Inside – So Get the Most from your Firewall

What about all of that data you shipped off to the cloud? Is it inside?

Directory of Suppliers

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Schneider Electric

Schneider Electric

Schneider Electric develops connected technologies and solutions to manage energy and process in ways that are safe, reliable and sustainable.

NESECO

NESECO

NESECO is an IT security integration and consulting firm.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

UKAS

UKAS

UKAS is the national accreditation body for the UK. The directory of members provides details of organisations offering certification services for ISO 27001.

CIA Botswana

CIA Botswana

CIA Botswana's partnership with leading cyber security firms enables it to provide unmatchable cyber defence services in Botswana and the rest of Africa.

Jobsite

Jobsite

Jobsite is an award winning job board in the UK providing job listings in the key sectors of IT, Engineering and Finance.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.