-
6,475 visitors, from over 80 countries, descended on Olympia London for the acclaimed annual cybersecurity event, seeing an impressive 35% growth in its second year. With 159 exhibitors demonstrating ...
-
Quorum Cyber, one of the first six UK companies named as a NCSC Cyber Incident Response (CIR) Level 2 Assured Service Provider, to run incident response workshop at International Cyber Expo.
-
Today, SpyCloud released its 2023 Ransomware Defense Report, an annual analysis of how security leaders and practitioners view the threat of ransomware & their organizations’ cyber readiness.
-
Our experienced incident Response specialists can provide advice, training and planning, specialist lead workshops and exercises, and simulated interactive scenarios.
-
Socura ranks among the Top 250 MSSPs for 2023, according to MSSP Alert, a CyberRisk Alliance resource.
-
We're very pleased to announce that we have been selected as one of TechRound's Cybersecurity Top 40!
Read the full nomination article here: https://techround.co.uk/competitions/36-e2e-assure/
-
"Honeytoken is a significant addition to our code and supply chain security platform," said Eric Fourrier, CEO of GitGuardian. "It enables organizations to detect intrusions in their DevOps environmen ...
-
Rich security suite enables seamless and secure path to transition corporate networks to the cloud, and accelerate innovation
-
How global animal health contract research and manufacturing company, Argenta, adopted Teneo’s Co-Managed SD-WAN for improved network performance.
-
How a global engineering, management & development consultancy has shifted the battleground from the network to the endpoint for increased customer value.
-
Teneo supports multinational consumer goods organization’s journey to SD-WAN.
-
How a leading U.S. law firm adopted Teneo’s service to improve visibility, security, and performance.
-
How Plan International, the global children’s charity, adopted Teneo’s SD-WAN Managed Service to reduce costs and improve connectivity across its remote locations.
-
How a leading US insurance company adopted Teneo’s AI-based Email Security, powered by Abnormal Security, to protect against email attacks and improve team productivity.
-
How fast-growing internet service provider, LightSpeed Broadband, took a preventative-first approach to stop ransomware and other malware from entering its environment.
-
A dedicated, first-of-its-kind, ‘Cyber Wellbeing Corner’ will be on-site for visitors at the exhibition, as a space for cybersecurity professionals to relax and recalibrate. London, UK, 4th Septembe ...
-
The latest Cyber Security Skills in the UK Labour Market report by GOV.UK found that over half of UK businesses currently face a shortage of basic Cyber skills and an additional 33% are experiencing a ...
-
The event, held under the Chatham House rule, brought together leading figures from UK national security agencies, including: the National Cyber Security Centre, Ministry of Defence, National Crime Ag ...
-
The Nuclear Decommissioning Authority (NDA), which works on behalf of the UK Government to safely clean-up the 17 oldest nuclear sites, and global Cyber services consultancy Templar Executives signed ...
-
Steelite International, a leading manufacturer, designer, distributor and supplier for the hospitality sector, has long had a robust approach to cybersecurity and has never suffered a serious security ...
-
See the full article at https://www.darkreading.com/threat-intelligence/russian-actors-compromised-healthcare-networks-ukrainian-orgs
-
Socura has relocated to Cardiff from London to capitalise on the Welsh boom in security skills, startups, and government investment since the pandemic.
-
Cyber Security Policy Monitor (CSPM) Version 3.4 to be demonstrated in the IASME Pavilion at International Cyber Expo 2023.
-
A twelve week Cyber Essentials Plus security project means the Green Lemon Company can now win a host of new projects
-
Consolidating Tradex’s full network infrastructure to increase security and business agility
-
The report "Five Years of GDPR: From Revolution to Evolution" presents a comprehensive analysis of the transformative journey of the General Data Protection Regulation (GDPR) over the past five years.
-
A new social media platform has taken the world by storm this past month. Created by Meta, the owner of Instagram and Facebook, Threads has been likened by many as a two-in-one social media platform. It has all the photo and video sharing capabilities of Instagram, in addition to the text-based interactions that makes Twitter so popular. It's the best of both worlds!
-
Skyrocketing energy bills, fuel prices reaching a record high and steep inflation rates, this is a worrying time for both individuals and businesses alike. The current economic uncertainty, however, has been particularly difficult for small and medium sized businesses (SMEs). They are less able to take advantage of economies of scale nor meet the salary demands of their employees; giving rise to yet another unforeseen challenge: insider threats.
-
IRONSCALES, the leading enterprise cloud email security platform announced its Summer ‘23 Release featuring the Beta launch of GPT-powered Phishing Simulation Testing (PST).
-
WCKD RZR launches the world’s fastest, simplest, data access revolution at Mobile World Congress 2023.
-
International Cyber Expo exhibitor and award-winning, female-led, educational organisation that re-skills adults into cyber security professionals, CAPSLOCK has launched a new campaign to encourage a ...
-
Steve Knibbs, Vodafone’s cybersecurity tsar, now chairs the tech industry body that lends expertise to the UK Government.
-
Look at some of the key challenges facing NHS leaders and how certain approaches can help to drive continuous proactive protection, rapid incident response and more efficient resource allocation.
-
This paper explores some of the challenges that a cyber manager in manufacturing faces today, what makes the industry special and how these challenges can be overcome.
-
This paper looks in more detail at the Government Cyber Security Strategy, and more specifically the underpinning National Cyber Security Centre’s Cyber Assessment Framework.
-
In this eBook we explore what exactly is a SOC, why you may need a SOC, the functions that a SOC performs, the cost of a SOC and more.
-
The Value of a SOC Infographic looks at what a SOC is, the people and technology a SOC needs, why you may need a SOC and the cost of running a SOC.
-
Find out how the Trust were able to work in partnership with Socura to build a SOC that would allow the in-house team to focus on the strategic work.
-
The optimal way to bridge the gap between cybercrime and cybersecurity is accessing the same information that criminals have, distilled into only the most actionable data for your specific enterprise.
-
There is a direct impact between secure access and business performance: if workforces are immediately connected to their applications in full trust, the business operates with much more efficiency. I ...
-
Nineteen Group, organisers of International Cyber Expo, today announces its programme for the annual Global Cyber Summit, sponsored by Sonatype, Opentext, and Infoblox, and hosted at Olympia London on ...
-
Email security leader unveils Themis Co-pilot for Microsoft Outlook: The first ICES solution with a fully generative AI phishing model, PhishLLM
-
IRONSCALES replaces secure email gateway (SEG) to protect market-leading services provider, Paschoalotto, from ransomware and VIP impersonation
-
“Data security is very important to us. Appointing a cyber security partner is all about trust and great communication, and we have that in abundance with Right Cue. The team have been with us every ...
-
"I would tell anyone who is considering working with them that Right Cue deliver a very good service. They know what they are doing. They are also patient. They are pragmatic and good at explaining ...
-
"We were keen to develop our IT security to the next level so we could expand our client base as well as giving existing clients further peace of mind. Working with RightCue has been a total pleasure. ...
-
"RightCue worked closely with us from the outset, going the extra mile to ensure this critical deadline was met and delivered within budget. They worked closely with us every step of the way and conti ...
-
RightCue delivered a tailored ISO 27001 consulting services package, aimed at causing minimum disruption to PRD’s business, bringing in expertise from its highly qualified and experienced team, and pr ...
-
The award coincides with DigitalXRAID’s appearance at Infosecurity Europe 2023 in London and two further award wins at the 2023 Cybersecurity and Resilience Awards.
-
The award-winning MSSP continues impressive momentum, growing its business by 70% and becoming recognised by CREST as one of only ten companies globally with a gold standard in app penetration testing
-
ITN Business has partnered with International Cyber Expo 2023, the UK’s leading cybersecurity event for industry collaboration, to premiere a news-style programme, ‘The Cyber Impact’. The unique repor ...
-
Skybox Security announced the next generation of its award-winning Security Posture Management Platform – including the industry’s first SaaS solution for Security Policy and Vulnerability Management.
-
Skybox Security, a global leader in Security Policy and Vulnerability Management, announced the appointment of Mordecai Rosen as Chief Executive Officer, and the closing of $50 million in financing..
-
Launching at the International Cyber Expo, Olympia, London, 26th September 2023
-
"The challenges are puzzles that use everyday objects to represent cyber security and privacy threats meaning that you don't have to be an expert to play it."
Meera Mehta, CEO, Xcapism Learning
-
"...to truly have a positive impact on behavioural change, we need to start engaging our colleagues"
Meera Mehta, CEO, Xcapism Learning
-
As hacking threats increase worldwide, Risk Ledger helps companies check their suppliers’ security status
-
With over 135 exhibitors and more than 4,800 visitors from across the globe attending its inaugural standalone run in 2022, the two-day event proved to be among the most inclusive, well-rounded, and a ...
-
Galaxy's threat research team provides insights into the business impact of global threats.
-
Organizations are facing an evolving threat landscape to the software that powers their businesses
-
- Automated generation and permissioned sharing of SBOMs saves valuable time in vulnerability discovery and mitigation
- Quick and seamless integration solves pressing challenge of SBOM management
-
Providing a cloud platform for world leading research.
-
TSL’s rapid response and deep skills help to keep frontline staff safe.
-
Fast and safe cloud migration services for your critical applications and data
-
Optimising the performance of your cloud environment
-
Security in the cloud services to keep your infrastructure safe
-
Creating a sustainable cloud cost/performance optimisation process
-
RevBits on-prem EDR chosen by the leading EPS provider in India with 80% of the market share.
-
RevBits Endpoint Security Wins the 2022 Fortress Cybersecurity Award for Endpoint Detection Solutions
-
Cyber Defense Magazine – Global InfoSec Awards, RSA (June 2022) RevBits Named Multiple Winner of Global InfoSec Awards at the RSA Conference 2022
-
The Globee Awards (March 2022) RevBits Privileged Access Management secures gold and edges out ThycoticCentrify Secret Server in the 2022 Globee Awards®
-
Golden Bridge Awards (October 2020) RevBits Recognized with Four Gold and Two Bronze Awards From the 2020 Golden Bridge Awards
-
Details of The Cyber Scheme's Advanced Practitioner Mentoring, for both Infrastructure and Web App, including content, how to book and inaugural dates.
-
Primenet is pleased to announce a successful placement on the most recent Crown Commercial Service (CCS) procurement frameworks, G-Cloud 13.
-
In 2022 the National Cyber Security Centre (NCSC) introduced a major overhaul of Cyber Essentials technical controls to reflect changes in technology since the programme’s launch in 2014.
-
2022 SME IT Awards Winners Announced
-
Although technology supports an organisation in many areas of cybersecurity, it is not a silver bullet solution which will eliminate the risk of a successful ransomware attack.
-
With so many cyber security options, how to decide what's right for my business? Don't choose a product; get a solution.
-
ESET, a global leader in digital security, has been awarded Leader status in G2’s report for summer 2022.
-
We are all familiar with taking care when downloading software from the Internet these days; if it doesn’t look right, we know it’s probably not right and we simply move on without downloading it.
-
Constant vigilance and suspicion are necessary in today’s world of sophisticated cybercrime and digital security threats. It’s not surprising that zero trust is a popular concept. It means that organi ...
-
If your infrastructure or data can be breached, you want to know about it before someone with malign intentions lets you know in a disruptive or even catastrophic way.
-
The Digital Outcomes Service (DOS 6) is a framework created by the Cabinet Office that allows public sector bodies to obtain digital services for the benefit of the public. The contract will run from ...
-
Committed to keeping all of your data safe. Stress-free.
-
UM-Labs R&D, have been awarded funding through the Defence and Security Accelerator (DASA) scheme with Defence Science and Technology Laboratory (Dstl).
-
The opportunities surrounding the space industry are becoming more attainable than ever before.
-
The ferocity of cyber-attacks and their impact on businesses has brought upon the soaring premiums of cyber insurance.
-
A cyber attack will inevitably come at the worst moment. What should a boss do when
their business is hit by a particularly nasty piece of ransomware? -
2021 has been a challenging year for those responsible for cybersecurity in public and privatesector organisations. Ransomware and software supply chain attacks have been constantly in the
headlines. -
TCBN is delighted to be partnering with International Cyber Expo 2022, Olympia London, Kensington, which will be host to 5000 delegates and over 100 leading cyber vendors throughout the 27-28th Septem ...
-
Only 14% of tech professionals believed the Online Safety Bill was ‘fit for purpose’, according to the survey by BCS, The Chartered Institute for IT.
-
Paired with the invaluable skills and experiences gained during service, veterans trained in cyber will be highly competitive in the current and future job market.
-
NHS Test and Trace leapt into action, creating an end-to-end service that combines testing, contact tracing and outbreak management to stop the spread of COVID-19.
-
In cyber security, we’re used to things de-railing our productive workday plans. When something needs dealing with, it needs dealing with. It’s how we deal with it that will make the difference
-
So you’ve heard there’s been a breach and you’re worried your data or your company’s data might have been stolen?
-
In November we announced our £2.1 million seed funding round, which is the cherry on top of an incredible couple of years of growth.
-
Tresorit extends its ultra-secure end-to-end encryption to emails and email attachments for businesses to protect their confidential data and comply with data protection requirements.
-
By adding Maltego to their toolkit, investigators can combine data enrichment, contextualization, and human analysis in a centralized location.
-
Winter 2022 Y-Combinator graduate Palitronica honoured with prestigious award
-
Synology today announced the launch of the Deep Learning NVR DVA1622 as it expands its successful line of deep learning network video recorders with a solution for smaller deployments.
-
Synology announces HD6500 — a streamlined multi-petabyte scalable storage solution.
-
Trusted IT Consultancy and Managed Services Provider Adds Equalum’s Reliable, Performant Data Integration to Its Solutions Portfolio to Help Accelerate Digital Transformation for Customers.
-
Do you feel that cyber threats are becoming more sophisticated and where should responsibility for threat mitigation lie within an organisation? As technology becomes more sophisticated, so to do the ...
-
Which questions do you need to ask yourself when you search for a suitable encryption solution to protect your sensitive business files?
-
Cyber Griffin is launching its new Baseline 3.0 on the 1st of October!
-
Ascentor will play a pivotal role supporting ARTEC to develop secure information technology components, for the next generation of BOXER Mechanised Infantry Vehicles.
-
Leeds-based cybersecurity consultancy Pentest People has opened a new office in the Hub8 innovation space in Cheltenham.
-
Leeds cyber security consultancy, Pentest People, has announced that it has launched a graduate recruitment programme and hired nine computer science graduates this month, in addition to taking on ten ...
-
Local cybersecurity consultancy, Pentest People, been named in the Digital Enterprise Top 100 list of the Leeds city region’s most resilient businesses that use digital technologies in the most innova ...
-
We understand the needs of government and corporate customers for monitoring and securing critical infrastructure, protecting your people and other valuable assets with ISR and UAS solutions.
-
When tasked with securing an application there is a choice between an automated vulnerability scan and a pentest. When starting out, companies will often focus on automated testing/scanning procedures ...
-
What keeps you awake at night as a security professional? We believe that these five cybersecurity questions, if left unanswered, will develop into much larger issues.
-
The threat of a standard cyber-attack is increasing by the day and businesses across the world need to be aware that it’s quickly become a case of ‘when’ not ‘if’ an attack will happen. When it comes ...
-
Your intellectual property is more valuable to your organisation than gold, so keeping it protected against cyber criminals and fraudsters should be taken very seriously. This blog highlights lessons ...
-
Forward-thinking businesses are embracing new tech with open arms. As a result, they’re seeing business efficiency, staff satisfaction, and profits soar, but what about when things go wrong? Your team ...
-
Supply chain attacks have evolved over time and as organisational supply chains increase, both in terms of size and complexity, they provide malicious threat actors with a myriad of opportunities in w ...
-
With the ever-increasing connectivity of the world we live in, supply chain security has never been more crucial. We now have unrivalled choice when it comes to the products and services we use as ind ...
-
Let’s face it, cyber crime is never going away and there will always be someone out there looking to exploit people, breach company networks and expose government secrets. However, it has been suggest ...
-
A record 657,790 new businesses were formed in the UK in 2016, and if you’ve taken the decision to go it alone, it’s an exciting time. You’re probably looking forward to getting your first customers, ...
-
Modern cyber-attacks can target a wide range of aspects of an organisation, so it’s critical to evaluate each aspect of your security program. A strong cybersecurity risk management plan will reduce y ...
-
As 2020 draws to a close, we’re probably not the only ones looking forward to kissing this year goodbye. As your organisation looks to the future, make sure you factor security into your plans for 202 ...
-
In the new year, we’re launching a hands-on training service that will help you learn more about offensive security. Let us train you to develop your cybersecurity knowledge by thinking like a hacker. ...
-
For a lot of us, 2020 felt like it was never going to end, but now that unprecedented year is finally behind us, what does the future hold for us in terms of security? Is there a new cybersecurity thr ...
-
Machine learning has been utilised in many different ways, but one use we probably didn’t see coming is face swap type video filters. Deepfake technology is becoming more accessible and more advanced, ...
-
The government has just released its road map out of lockdown, but what does this mean for organisations and their staff? Will employees start returning to their offices, or is remote working here to ...
-
Ransomware has been plaguing organisations (and filling the pockets of cybercriminals) for over 30 years now, but this type of malicious software is still on the rise. Let’s take a look at how ransomw ...
-
In our previous blog, we looked at the evolving threat of ransomware, so now let’s take a look at how to meet this threat head on. Here’s how to avoid becoming a threat actor’s next target, and what t ...
-
From on-the-go mobile games, to VR and competitive e-sports, the gaming industry is booming. With progression comes a whole host of new challenges, and one that can’t be ignored is cybercrime in gamin ...
-
Despite all the good they do, the non-profit sector is a prime target for cybercriminals, which is why cybersecurity for charities is so important. With an annual income of over £69 billion in 2019, a ...
-
We provided a pro bono penetration test to a charity that supports blind and partially sighted people. In this project, our consultants were able to identify a variety of vulnerabilities across multip ...
-
Secarma worked closely with a well-known management software provider to test the strength of their flagship application’s cybersecurity posture. Our experts carried out a collaborative penetration te ...
-
Andrea Pfundmeier founded the German IT security startup Secomba at the age of just 23. Today, 10 years later, she talks about the lessons she has learned and shares tips for aspiring female founders.
-
Threats have changed and the context within which most work takes place has changed. And if you understand that all behaviour is driven by context, then approaches to secure our people must adapt.
-
ThinkCyber have won techUK’s Cyber Innovator of the year 2021. An award that recognises the latest leading edge capabilities, selected from a range of innovative SMEs across the UK cyber eco-system.
-
CENSUS can assist both users and suppliers (OEMs, Tier-1 and Tier-2) of military systems to achieve secure usage, to improve security and eventually to reduce the applicable risks. Using the latest at ...
-
A Summary of the findings from a 3M sponsored Ponemon Institute Study “The Impact of the New Normal on Workplace Privacy: A Study of Business and IT Security Managers.”
-
The question of how long the ‘new normal’ will prevail is paramount: remote working raises many concerns around privacy, employee welfare and productivity; issues which will be discussed in the eBook.
-
Transcript: No company wants to put its business at risk. Indeed, we all strive for success, while continually trying to mitigate risk. The key to enabling this lies in protecting and preventing cyber ...
-
Fourth annual conference will bring together identity security experts from around the world to discuss trends and challenges in managing identity security in hybrid and multi-cloud environments
-
RevBits named within the top 25 Cyber Security companies of 2020.
-
RevBits today announced it was declared as a winner in six categories by the 2020 Golden Bridge Awards® that recognize the world’s top providers by their organizational performance, innovations, produ ...
-
RevBits names 'Top Cyber Security Solutions Provider.'
-
RevBits announces the general availability of its Cyber Intelligence Platform (“CIP”), an integrated solution that is designed to provide companies across the globe with unparalleled protection agains ...
-
Cybersecurity Solutions provider RevBits Wins Multiple Awards in the 9th Annual Global InfoSec Awards at #RSAC 2021 RevBits is proud to announce that it was the winner of the following award(s) from C ...
-
News & Events
-
Learn more about the ever changing cybersecurity attack vector with these data-driven blog posts
-
ICSA Labs - independent testing authority for advanced threat detection. Results: Several months of advanced testing demonstrated the superb efficacy in detection and response for RevBits Endpoint Se ...
-
Boxcryptor is a finalist in the category "A: Safety, IT & Cyber Security for Industry and Automation" in the readers' vote for the next GIT SECURITY AWARD.
-
The Boxcryptor Team decided to support schools in digitising and protecting the personal data of all school members. Schools will receive the encryption software Boxcryptor with a special discount.
-
In 2021, Boxcryptor celebrates its 10th anniversary. The company has successfully transformed from a startup to an established regional employer and looks back proudly on the past 10 years.
-
On 26 March, the UK government unveiled its Cyber Security Export Strategy. The Department for International Trade (DIT) created this strategy to help the United Kingdom capitalize on the world’s ever ...
-
Hacker attacks have increased massively in recent years, and there are almost daily reports of losses amounting to millions. Networks of established companies and corporations are being attacked and c ...
-
SECURE MOBILE COMMUNICATION
In most industries, mobile communication takes place on smartphones that operate on mobile and wireless networks. -
The Cyber Outstanding Security Performance Awards (Cyber OSPAs) recognise and highlight outstanding performance by companies, people, products and initiatives across the cyber security sector globally.
-
The term “smart” has been used for some time now to broadly describe the adoption of technology by a city or infrastructure owner. The expression has begun suffering from overuse, particularly where t ...
-
What? The Defence Cyber Protection Partnership (DCPP), comprising UK Ministry of Defence (MOD) representatives, 13 prime suppliers and defence industry trade bodies, was established in 2012 to improve ...
-
2020 wasn’t the first year where a virus emerged causing large scale disruption and opportunities for cybercrime. It was, however, the first time that the virus in question wasn’t created by cyber criminals. But that certainly didn’t stop them exploiting it.
Our cyber security review of 2020 therefore has to start with how the COVID-19 pandemic impacted cyber crime and how the NCSC responded. We also include some of our content on the risks to homeworkers and SMEs, cover the creation of the National Cyber Force, of interest to the defence sector, and share new research on easy to guess passwords and data breaches. Different year, same old mistakes.
-
Our ExeonTrace Network Detection and Response (NDR) platform gives our customers a smart and innovative way to monitor the security of their networks, immediately detect cyber threats, and effectively ...
-
In a world increasingly dependent on data we deliver professional LTE solutions bringing the level of functionality and reliability of current TETRA networks with complete integration capabilities.