News

2020-08-26

VPNs – Training and Access – both now available on CYRIN

Want to set up a VPN - we've got virtual labs for that. Want to use VPN access to bring your own tools to CYRIN Cyber Range? You can do that too.

2020-08-25

AI Helps Organisations Resist Cyber Crime

Attacks are growing in volume and complexity all the time and AI is helping under-resourced cyber security teams stay ahead of threats.

2020-08-25

Cyber Security Industry Growth Rate Will Reduce

With customer budgets under pressure from the Covid-19 epidemic, reduced demand for cyber security products and services is widely predicted.

2020-08-24

Satellite Communications Need Protection

If hackers can intercept a satellite's signals, it is possible they can invade an organisation’s entire network by infiltrating its ground station.

2020-08-24

Industrial Robots Are Not Safe From Cyber Attack

Similar to remote working humans, when they are incorrectly set up and poorly secured, industrial robots can be a source of major security issues.

2020-08-24

Hackers Attack Israel’s Defence Sector

Suspected N.Korean hackers use LinkedIn to deliver fake job offers, aiming to infiltrate defense networks and steal sensitive security information.

2020-08-21

Creating Post-Modern Intelligence

The Internet is creating a global collaboration that is changing the way we view social connections and national borders. By Alfred Rolingon

2020-08-21

Remote Working Has Real Cyber Security Risks

Remote workers are highly vulnerable to cyber criminals during lockdown, but this could be just the push needed to transform cyber security.

2020-08-19

Identity Theft - A Very Personal Hacking Attack

Recently, a US Woman was hacked and her personal data held to ransom. She contacted us to tell her story and agreed that we tell it to you here.

2020-08-19

Cyber Crime Is Growing Very Fast Due To Coronavirus

An Interpol assessment of the impact of Covid-19 on cyber crime shows a significant change of focus to business and major corporations.

2020-08-19

Advanced AI For Cyber Operations

US defense research agencies want “autonomous software agents” capable of countering targeted network attacks & large-scale malware campaigns.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bryan Cave LLP

Bryan Cave LLP

Bryan Cave LLP is a global business and litigation law firm. Practice areas include Data Privacy and Security.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Meiya Pico Information Co

Meiya Pico Information Co

Meiya Pico is the leading digital forensics and information security products and service provider in China.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Turk Telekom

Turk Telekom

Turk Telekom is the first integrated telecommunications operator in Turkey.

Star Lab

Star Lab

Star Lab specializes in the development and productization of embedded security technologies.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.

CNNECT

CNNECT

CNNECT are specialists in cloud, collaboration and cybersecurity, constantly evolving the way in which we understand, advise and deploy these technologies

Scalefusion

Scalefusion

Scalefusion provides a comprehensive suite of products engineered to simplify endpoint, user, and access management for IT teams.