News

2024-10-27

Teach Your Children About Safer Cyber Security

Internet safety and cyber security are vital parts of technology education. Adults need to ensure youngsters can navigate the digital world safely.

2024-10-26

Getting A Return On Cybersecurity Investment

Can Businesses Really Put a Price on Prevention? A deep dive on investing in cybersecurity tools. By Frank Horneberg & Simon Newman

2024-10-28

Dark Data Helps Boost Business

Unveiling Hidden Insights: Dark data represents a vast reservoir of untapped potential for businesses across industries. By Jacques du Preez

2024-10-28

Zero Trust Architecture: The Key To Securing Hybrid Environments 

Securing hybrid environments, which blend on-premise, public cloud and private cloud resources, presents a complex challenge. By Asher Benbenisty

2024-11-01

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

2024-10-26

Online Killer Sentenced To Life In Jail

Sextortion: Cruel and degrading abuse led to the suicide of one child and the pitiless exploitation of thousands of others, from 3,000 miles away.

2024-10-25

2024 US Presidential Election Cyber Intrusion: Part 4 - Rising Hacktivist Threats

USA 2024 Elections: As the polls narrow, Hacktivists acting on behalf of both Russia & Palestine are intensifying their operations. By Craig Watt

2024-10-25

BRICS Summit: Russia's Foreign Ministry Attacked

Raining On Putin's Parade: Foreign Ministry was hit by a severe cyber attack, that coincided with a high profile BRICS summit in Kazan.

2024-10-25

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?

With economic pressures mounting, the need to modernise outdated IT systems and make smarter security investments is crucial. By Dan Lattimer

2024-10-25

Building Secure Workflows: Using LCNC Platforms For Automating Cybersecurity Tasks

Protecting sensitive data is critical, with increasing pressure on security teams. That's where low-code/no-code (LCNC) platforms come in.

2024-10-18

Four Reasons To Migrate Your Business To The Cloud

A Sound Migration Strategy: Many more companies are adopting cloud computing as a core part of their operations. Here are the reasons why.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

QNAP Systems

QNAP Systems

QNAP Systems, Inc. delivers world class network attached storage (NAS) and network video recorder (NVR) solutions.

Apicrypt

Apicrypt

Apicrypt enables secure communications between health professionals by using strong encryption technologies.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

StationX

StationX

StationX is a leading provider of cyber security training, consultancy and services.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Stefanini Group

Stefanini Group

Stefanini is a global IT services company providing a broad range of solutions for digital transformation including automation, cloud, IoT and cybersecurity.

Tugboat Logic

Tugboat Logic

Tugboat Logic was created to address the skills and expertise gap in the security and compliance industry. Our goal is to simplify and automate information security management for every enterprise.

Financial Services Information Sharing and Analysis Center (FS-ISAC)

Financial Services Information Sharing and Analysis Center (FS-ISAC)

The Financial Services Information Sharing and Analysis Center is the only global cyber intelligence sharing community solely focused on financial services.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Ministry of Electronics & Information Technology (MeitY) - India

Ministry of Electronics & Information Technology (MeitY) - India

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

G-71

G-71

G-71 LeaksID is a cutting-edge ITM technology aimed at safeguarding sensitive documents from insider threats.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.