FREE TO VIEW


« Back to News

2021-11-23

Cyber Security Startups Prepare For Takeoff

Launch, Grow & Scale: 100 - plus British startups join the Cyber Runway accelerator programme, to address the UK's cyber security challenges.

2021-11-23

Online Campaign To Influence Presidential Elections - Iranians Charged

The accused hacked information from the US voter database, then threatened voters via email and released a fictitious video promoting fake news.

2021-11-23

Lottery Fraud Costs Victims £1m

Action Fraud are warning British lottery gamers to beware of email fraud asking them to pay an advance fee to release their alleged winnings.

2021-11-22

Wind Turbine Maker Shuts Down Computer Systems

One of the world’s largest wind turbine makers has suffered a 'cyber security incident' forcing it to shut down IT systems across multiple locations.

2021-11-22

How Will The US Congress Decide To Regulate Facebook?

Mark Zuckerberg has enough problems to fix and now there’s a critical issue at hand for Facebook's CEO, involving the US Congress. By Eliza Sadler

2021-11-22

How Does IAM Help In GDPR Compliance?

Using Identity and Access Management (IAM) facilitates GDPR compliance and makes sure that most GDPR requirements are adhered to. By Naren Sahoo

2021-11-22

British Students Learn About Ethical Hacking

Career Opportunities: Training to becoming a Certified Ethical Hacker (CEH) can be a smart career move and skilled practitioners are very well paid.

2021-11-22

Nobelium - Long Term Threat Activity

Microsoft Warning: Russia hackers are trying to gain long-term, systematic access to the US technology supply chain for surveillance and disruption.

2021-11-21

Hackers Achieve Widespread Penetration Of Defense Contractors

Password Vulnerability: Suspected foreign hackers breached nine organisations in the US defense, energy, health care, technology & education sectors.

2021-11-19

123456 Is Not A Password

The exploding use of online apps & services means users increasingly have to remember many more passwords - and passwords are the weak link.

2021-11-19

Do People Lie More Often When Using Social Media?

As social media becomes ubiquitous in our daily interactions, does the design of these technologies affect the readines of people to tell the truth?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

Cybersecurity Credentials Collaborative (C3)

Cybersecurity Credentials Collaborative (C3)

C3 provides a forum for collaboration among vendor-neutral information security and privacy and related IT disciplines certification bodies.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

ECS

ECS

ECS is a leading information technology provider delivering cloud, cybersecurity, software development, IT modernization, and advanced science and engineering services.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

ITsMine

ITsMine

ITsMine’s Beyond DLP solution is a leading Data Loss Prevention solution used by organizations to protect against internal and external threats automatically.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

Recon InfoSec

Recon InfoSec

The Recon InfoSec team includes analysts, architects, engineers, intrusion specialists, penetration testers, and operations experts.

Banyax

Banyax

Banyax provides 24×7 real-time Cyber Defense Center Services using the latest technology tools to provide state-of-the-art defense.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Zenzero

Zenzero

Zenzero simplifies technology adoption and supports our customers through managed and outsourced IT support.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

EVVO LABS

EVVO LABS

EVVO Labs empower your business with the latest IT capabilities to get you ahead of your competitors. We are experts at converging technologies to build your digital transformation.