News

2020-09-21

A Hospital Hack Caused A Patient To Die

Medical staff believe a woman died from the delay in treatment after hackers attacked a German hospital’s computer system with ransomware

2020-09-17

Cyber Security Should Be A Mandatory Requirement

With increasing threats and fewer opportunities to fail, governments must rise to the challenge to protect national security and economic prosperity.

2020-09-17

Latest Cyber Security Threats & Trends: 2020 In Review

What are the key cybersecurity threats and trends that every business needs to understand in 2020 and beyond? By Eddie Segal

2020-09-16

Cyber Security Training For Employees

It's a plain truth that employees, from senior management to part-timers, are the largest cyber security vulnerability that any organisation faces.

2020-09-16

How Do Cyber Criminals Operate?

The sophisticated tactics used by cyber criminals make it extremely difficult for law enforcement to collect evidence, then catch and prosecute them.

2020-09-15

Nation-State Hackers Are Infiltrating The 2020 Election

Microsoft has evidence that nation-state cyber-attacks are targeting individuals & organisations involved in the impending Presidential election.

2020-09-14

Four Essential Questions To Ask A Cybersecurity Expert

Most companies should consider hiring a cybersecurity expert in order to keep their confidential information safe. by Jennifer Bell

2020-09-14

Schoolchildren Are Better At Cyber Security Than Their Teachers

Many teachers believe their pupils have better knowledge of cybersecurity than they do. Half don't think their school has done enough to stay secure.

2020-09-14

Cyber Security Deadline For Mariners

The international deadline to incorporate cyber security into seagoing systems looms, but many questions about training mariners remain.

2020-09-09

British Cyber Security Market 2020

Analysis of the UK cyber security industry, including its size, employment & revenue, reveals that business is booming across all sectors.

2020-09-10

Need to Evolve to a Risk-Based Vulnerability Management Strategy but Don’t Know How? This Guide Will Show You.

Implementing a Risk-Based Vulnerability Management Solution is easier than you think. This Guide from Tenable shows how: Download

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BMC Software

BMC Software

BMC provide solutions for IT service management, Cloud management, IT workload automation, IT operations, and mainframe system management.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Xage Security

Xage Security

Xage is the world’s first blockchain-protected security platform for Industrial IoT.

Wotan Monitoring

Wotan Monitoring

Wotan Monitoring is the software solution for fully automatic process monitoring, infrastructure monitoring and end-to-end monitoring.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Dual Layer IT Solutions

Dual Layer IT Solutions

Dual Layer offer a full range of IT Services and Solutions for businesses from IT infrastructure design to cloud/hosted solutions, cybersecurity, disaster recovery and IT training.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

BlueAlly

BlueAlly

BlueAlly helps clients scale, optimize, and manage their IT resources to reach their business goals.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Nine23

Nine23

Nine23 are a highly focused cyber security solutions company that defines, builds and manages innovative services, enabling end-users to use technology securely in today’s workplace.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

Secur-Serv

Secur-Serv

Secur-Serv is a security-first managed services provider. We provides Managed IT, Managed Print, Managed Device, and Cybersecurity services to companies of every size.