FREE TO VIEW


« Back to News

2021-07-15

CYRIN Have Created Some New Training Options

Creating Training Options: CYRIN Cyber Range has something new - including three new packages – for great new career pathways.

2021-07-08

EU Says That UK Data Protection Rules Are ‘Adequate’

The EU says that UK data protection standards are “adequate” until 2025, but the UK is working on its own data transfer regime to replace GDPR.

2021-07-08

Cyber Insurance - Making The Ransomware Crisis Worse

Some ransomware gangs specifically target victims with cyber security insurance because they think its the best way to guarantee they get paid.

2021-07-08

SANS & AWS Marketplace Webinar: (Re)Defining XDR In AWS

Thursday, July 22th, 2021 | Join this webinar to learn how to build stronger detection capabilities and better response orchestration with XDR.

2021-07-07

EU Sets Up An Emergency Team To Handle Large Scale Attacks

The EU Commission has announced that it will build a rapid response Joint Cyber Unit based in Brussels to combat large scale cyber attacks.

2021-07-07

What Is The Best Defense Against Phishing?

Although virtually everyone knows about phishing and how it works, many people still fall victim, but you can protect yourself. By Ben Hartwig

2021-07-06

Cyber Security In Fintech: Top 5 Tips

Fintech companies cannot afford to ignore cyber security and must build their resilience at a time when extraordinary attacks happen every day.

2021-07-06

Swedish Supermarkets Closed Down By US Ransomware Attack

Overspill: A supermarket chain in Sweden is one of a growing number of overseas organisations affected by attack on IT software supplier Kaseya.

2021-07-06

$70m Ransom Demand To Restore Hacked Data

The REvil cyber crime group have significantly raised the bar for the level of ransom demanded in their widespread attack on Kaseya customers.

2021-07-05

Technical Debt Is A Serious Threat To Innovation

Technical debt is a technical design or development choice made for short-term benefit with long-term consequences for cyber security.

2021-07-05

Pentagon CISO Accused Of Leaking Classified Intel

The top Pentagon official, who was overseeing its new cyber security initiative, has been placed on indefinite leave while being investigated.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

National Center for Manufacturing Sciences (NCMS) - USA

National Center for Manufacturing Sciences (NCMS) - USA

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Start Left® Security

Start Left® Security

From Posture to Performance—The System That Improves How Software Gets Built.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Cyberleaf

Cyberleaf

Cyberleaf is simplified managed cybersecurity for MSPs, enabling top tier cyber protection for small and medium enterprise.

Crisis24

Crisis24

Crisis24 is a leading integrated risk management, crisis response, consulting, and global protective solutions firm.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

Scamnetic

Scamnetic

Scamnetic offer an everyday application that helps consumers detect every type of scam in real time – removing human error from the equation.