News

2023-06-01

Cyber Security In An Ever-Growing Digital World 

Digital Transformation: As more data-driven infrastructure technologies are introduced, the risk of cyberattacks increases. By Carl Shallow

2023-05-31

Microsoft 365 Under Threat From A New Phishing Tool

‘Greatness’: A sophisticated Phishing-as-a-Service tool deployed against manufacturing, healthcare & technology companies that use Microsoft 365.

2023-05-31

Can Automation Help Bridge The Cyber Skills Gap?

Finding key cybersecurity staff is increasingly difficult - UEBA, Threat Intelligence Automation & SOAR can offer solutions. By Tim Wallen

2023-05-29

Demystifying Data Privacy Compliance

The Importance Of Data Privacy Compliance: Learn the truth behind 6 common myths and avoid costly mistakes that could harm your business.

2023-05-30

Deepfakes Are A Growing Threat

Left unregulated, entire populations could have their opinions influenced by deepfakes delivering disinformation and distorting true events.

2023-05-30

Always-On Protection Using Immutable Storage

Immutability In Action: In the ever-changing world of data security compliance, Immutable Storage offers an ever-reliable solution. By Richard Massey.

2023-05-30

Europe - The DDoS Battlefield Of 2022

DDoS attacks are a reflection of major geo-political challenges and have become an increasingly significant part in hybrid cyber warfare. 

2023-05-29

Spy Agencies Warn Of New Threats From Chinese Hackers

Volt Typhoon: The Five Eyes group of western intelligence agencies has issued a notice detailing the nature of the threat from Chinese hackers.

2023-05-26

Enabling Quantum-Safe Cryptography

End-To-End Solution: IBM has released a roadmap outlining the steps organisations can take to transition to quantum-safe cryptography.

2023-05-26

Vulnerable Networks & Advanced Persistent Threats

A poor level of visibility into networks exposes organisations to cyber risks and consequent large-scale disruptions, inflicting substantial losses.

2023-05-25

The Security Risks Of ChatGPT

How Businesses Can Safeguard Their Data: With ChatGPT, criminals can quickly develop malware that wreaks havoc on companies. By Richard Massey

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

Resolvo Systems

Resolvo Systems

Resolvo is provides comprehensive security assessment and testing services in Asia.

tTech

tTech

tTech is the first and foremost company providing outsourced Information Technology solutions to businesses in Jamaica.

Clearnetwork

Clearnetwork

Clearnetwork specializes in managed cybersecurity solutions that enable both public and private organizations improve their security posture affordably.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.