FREE TO VIEW


« Back to News

2023-01-25

Preventing Ransomware Attacks Begins With You

Don't Forget To Protect Your Data: What business owners need to know about identifying attacks and keeping their employees safe.

2023-01-25

Coming Your Way - The Top Cyber Crimes In 2023

A sharp increase in cyber crime is becoming visible, affecting a variety of industries & organisations in many ways, some old and some new.

2023-01-25

Who Foots the Bill For A Data Breach? 

Data breach is almost inevitable, yet many companies and their MSPs are unclear about their legal & financial obligations. By Simon Pamplin

2023-01-25

Five Application Security Predictions For 2023

The shift to cloud native applications is a driver of significant opportunities and challenges in the area of cybersecurity. By Dean Agron

2023-01-24

Ukraine Signs Cyber Security Deal With NATO

The cyber security collaboration gives Ukraine access to NATO’s malware information sharing platform, along with 'enhanced cyber cooperation'.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-23

British School Childrens' Confidential Data Dumped

A hacking gang focused on schools & colleges has leaked confidential data about children on the Dark Web after failing to extract any ransom.

2023-01-23

War In Ukraine Drives A Decline In Stolen Cards

Russia's failing invasion of Ukraine led to a 62% decrease in stolen payment card records, attributed to a crackdown on domestic cyber criminals.

2023-01-23

The Back Door Threat To Cybersecurity

Advanced Persistent Threats (APTs) pose a unique challenge with motives, techniques, and tactics that differ from traditional cyberattacks.

2023-01-21

How Next Gen SIEM Addresses The Risks Of Disjointed Security Tools

Multi-vendor Enterprise Software Challenges: With next gen SIEM, unifying disjointed security tools and data sources is more easily achievable.

2023-01-21

T-Mobile Hacker Exposes 37m Customers' Personal Data

Unfortunately Not Immune: T-Mobile has disclosed seven major breaches since 2018 and the latest event may be one of the biggest of all time.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

DDOS-Guard

DDOS-Guard

DDoS-GUARD is one of the leading service providers on the global DDoS protection and content delivery markets.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

Broadcom

Broadcom

Broadcom is a global technology leader that designs, develops and supplies a broad range of semiconductor and infrastructure software solutions.

Diligent

Diligent

Diligent's SaaS GRC platform gives leaders a connected view of governance, risk, compliance and ESG across their organization.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Harrison Clarke

Harrison Clarke

Harrison Clarke is a leading staffing and recruiting firm in the Cloud, Cybersecurity, Data & AI space.

nodeQ

nodeQ

At nodeQ, we are pioneering the future of computer networks, leveraging our deep expertise in quantum communication, artificial intelligence, and software-defined networking.

Revytech

Revytech

Revytech is a tech company providing services in a broad range of areas including IT operations, cyber security and network engineering.