News

2020-05-04

Zoom 5.0 Aims To Reduce 'Zoom Bombing'

Zoom is a prime target for hackers and spies but security researchers are saying that even the new 5.0 app with encryption is a privacy threat.

2020-05-12

Effective Cyber Security Training Using The GoCyber App

One of the major issues that all organisations face is the need for real time cyber training of their people. There's an App for that.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-05-04

British Government Advice Threatens Your Cyber Security

The UK National Cyber Security Centre (NCSC) is recommending that you save your passwords in your browser. We don't recommend it.

2020-05-01

Lockdown Security Apathy Could Be A Big Risk

Organisations are struggling to get employees to buy into cyber security with a third of IT leaders saying their remote workers simply don’t care.

2020-05-01

Quantum Computing Has Far Reaching Effects On Security

Quantum computers are capable of code-breaking applications that could pose major risks to the security of current communications systems.

2020-04-30

Webinar: How to implement a software-defined network security fabric in AWS

Thursday, May 14th | Join SANS & AWS to learn how implementing an SDN can enhance visibility & control across multiple VPCs in your network.

2020-04-29

Massive Business Cost Savings With Effective Cyber Security

Cynapse calculate that UK business can save up to 40%, worth £1.3b, by shifting a proportion of their cybersecurity work to smaller innovative firms.

2020-04-29

Why Is The Skills Shortage So Big?

Companies need to keep their critical data secure, but the growing shortage of qualified cybersecurity professionals is making it difficult.

2020-04-29

Ransomware Authors Go Beyond Malicious Encryption

Ransomware is mutating into a phenomenon with two-pronged extortion at its core, adding data theft to the threat of blackmail. By David Balaban

2020-04-28

Q1 2020: Key Trends In Cyber Security

The worldwide response to Covid-19 is not the whole story for cyber security so far this year and there are some other significant emerging trends.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

InformationWeek

InformationWeek

InformationWeek is the world's most trusted online community for business technology professionals like you.

Secure Identity Alliance (SIA)

Secure Identity Alliance (SIA)

The Secure Identity Alliance is dedicated to supporting sustainable worldwide economic growth and prosperity through the development of trusted digital identities and the adoption of secure eServices.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

La Fosse Associates

La Fosse Associates

The InfoSec Recruitment team at La Fosse Associates specialises in placing Information Security & Risk professionals on a permanent and contract basis.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

TechDemocracy

TechDemocracy

TechDemocracy are a trusted, global cyber risk assurance solutions provider whose DNA is rooted in cyber advisory, managed and implementation services.

SecureDrives

SecureDrives

Passwordless Authentication & Encrypted Data Storage Solutions from SecureDrives. We are enabling organisations to work safely and securely, using technology driven solutions.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Com Olho

Com Olho

Com Olho provides the measurement, analytics, quality assurance, and fraud protection technologies brands need for their business and customers.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

ZINAD IT

ZINAD IT

ZINAD is an information security company offering state-of-the-art cybersecurity awareness products, solutions and services.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Sprocket Security

Sprocket Security

Sprocket Security protects your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.