News

2022-06-16

Fixing The Cyber Security Workforce Gap

Recruiting entry level & junior staff and investing in their professional development results in more resilient, sustainable cyber security teams.

2022-06-17

Cloud Computing & Security: What Enterprises Should Know

What are the things that enterprises need to know regarding the maintenance of data in the cloud - is it really safe & secure? By Nicholas Parker

2022-06-14

Elon Musk, YouTube & Bitcoin

Crypto Fraud: YouTube is being criticised for failing to tackle a network of cyber criminals streaming fake Elon Musk videos to steal from viewers.

2022-06-20

British Defence Ministry Gets A Quantum Computer

The British government has got its first quantum computer to process complex calculations at high speed, focused on military applications.

2022-06-20

Channel Islands Used To Launch Global Cyber-Attacks

Usually a target for attack, computers in Jersey have been hijacked and used to launch cyber attacks against target organisations worldwide.

2022-06-13

Warning: Chinese Cyber Attacks

US security agencies say Chinese state-sponsored threat actors are actively targeting telecoms across a wide range of network service providers.

2022-06-13

Ransomware & Cybercrime

Reading List: An important new book demonstrates how cyber attacks, in their different forms & varieties all require one thing. Access.

2022-06-09

Data Breaches & Identity Theft: Is Your Online Classroom Secure?

Bugs, Viruses & Identity: Three common security problems in the online classroom and the remedial measures to deal with them. By Diane Wong

2022-06-29

Human Brain Changes With Digital Technology & Implants

Research on the brain-health consequences of digital technology is showing how devices & software can both help and harm brain function. 

2022-06-10

Penetration Testing For An Effective Cyber Security Defence

Penetration Testing: A simulated attack to identify the weak spots in an IT system's defences which attackers could take advantage of.

2022-06-09

Artificial Intelligence Will Change The Future Of The World

The continued rapid development of technology, plus research in quantum computing, gives AI the potential to evolve at high speed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pluralsight

Pluralsight

Pluralsight helps enterprises build technology skills at scale with expert-authored courses on today’s most important technologies including information and cyber security.

RSA Security

RSA Security

RSA provide cybersecurity products for Threat Detection and Response, Identity and Access Management, Governance, Risk and Compliance, and Fraud Prevention.

F-Response

F-Response

F-Response is a software utility that enables an investigator to conduct live Forensics, Data Recovery, and eDiscovery over an IP network using their tools of choice.

Cross Identity

Cross Identity

Cross Identity (formerly Ilantus Technologies) is a complete IAM solution that is deep, comprehensive, and can be implemented even by non-IT persons.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

Secure Innovations

Secure Innovations

Secure Innovations is a cybersecurity firm dedicated to providing top-tier cyber security solutions for the Defense and the Intelligence Community.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions (EPS)

Extreme Protocol Solutions is an industry leading Data Sanitization Software, Hardware and Onsite Service Provider.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.