FREE TO VIEW


« Back to News

2021-04-17

Webinar: Building A Security Observability Strategy In AWS

In this webinar, SANS and AWS Marketplace will discuss how to architect a security observability strategy in AWS, with practical guidance and tips.

2021-03-29

Create A Cybersecurity Compliance Plan With These Seven Tips

Creating a cybersecurity compliance plan does not need to be overwhelming. Here are seven tips that will help secure your company. By Lauren Groff.

2021-03-29

CISA, NSA And The Dual Hat

Recent drastic failures in US cybersecurity mean it is now time to end the division beween internal and external security agencies. By Ronald Marks.

2021-03-30

Investigating Fake News With Google, YouTube & Facebook

The big three Social Media chiefs grilled by US politicians over the proliferation of disinformation on the YouTube, Twitter and Facebook platforms.

2021-03-30

Facebook's Internal Content Rules Revealed

Facebook users are allowed to call for the death of public figures and can praise mass murders based on vague definitions of what constitutes a crime.

2021-03-29

Avoiding Arrest: Cyber Criminals Share Dark Web Secrets

On the Dark Web there are many secrets to be found, including insights into what criminals advise each other to say and do in case they get caught.

2021-04-01

New Cyber Security Measures To Protect US Energy

The US is launching new research programs to to safeguard the national energy system from the growing threat of cyber and physical hazards.

2021-03-30

NSA Will Hunt Cyber Attackers Inside The US

US Senators will support expanding the scope for the NSA and US Cyber Command to resume conducting intelligence gathering domestically.

2021-03-26

FBI 2020 Online Crime Report

The FBI says that the top three crimes reported by victims in 2020 were phishing scams, non-payment/non-delivery scams and extortion.

2021-03-26

Trump is Planning A Social Media Return

Following a permanent ban on Twitter and Facebook, Donald Trump will launch his own social media platform to express his views.

2021-03-25

China Plans For Supremacy In AI & Quantum Computing

China's latest five-year plan stands out for its emphasis on advanced technologies and innovation as it aims for supremacy in key sectors.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

Viscount Systems

Viscount Systems

Viscount Systems is a global security software solutions company that is changing the way access control is deployed and managed in the enterprise.

Aricoma

Aricoma

Aricoma are Architects of Digital. We aim to become a major player in end-to-end IT services and digital transformation in Europe.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

BlueSteel Cybersecurity

BlueSteel Cybersecurity

BlueSteel is a compliance consulting firm that leverages deep system, data and application expertise to build sustainable cybersecurity solutions.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

SEK Security Ecosystem Knowledge

SEK Security Ecosystem Knowledge

SEK helps companies in the complex path of cybersecurity; in the analysis, detection and prevention of digital threats.

Institute for Applied Network Security (IANS)

Institute for Applied Network Security (IANS)

For the security practitioner caught between rapidly evolving threats and demanding executives, IANS Research is a clear-headed resource for decision making and articulating risk.

TestifySec

TestifySec

TestifySec is an evidence-driven security and compliance platform that turns every software build into cryptographic proof, letting teams ship secure, audit-ready software.