LATEST ARTICLES

Cyber Security companies – World innovations making their way into the UK security market

The various occurrences in the year 2017 including WannaCry, the NSA leak, the Equifax breach, etc. show that the year was full of cyber...

Security Vulnerabilities – An Ever-Growing List

Cybersecurity is a broad field, yet when many hear the word cybersecurity they typically think of viruses sent through email, or the endless cyberwar...

TECHNOLOGIES BEHIND NEXT GENERATION FIREWALLS

In a world of increasing cybersecurity attacks, all businesses small or big need to balance the network performance with the network security concerns. There...

InfoSec Jobs – Cyber Security Sales Specialist – Scotland

Security is our customers' number one concern and as a leader in cloud, data, and mobile solutions, security is has never been more important...

InfoSec Jobs -Manager, Cyber Security, Financial Services, Edinburgh

Do you have the vision to see through problems? Then join EY to gain experiences that will last a lifetime. It is an exciting time...

SAFEGUARDING ORGANISATIONAL DATA USING PATCH MANAGEMENT BEST PRACTICES

IT managers and project manager tend to put software updates as the last task of the system maintenance. Software maintenance is very crucial in...

TOP CYBER THREATS TO LOOK OUT FOR IN 2018

In today’s digital world, you cannot 100% forecast the security breaches with hopes of coming with mitigation strategies. Cybercriminals are getting smarter each day...

SCADA Security – The ICS Critical Infrastructure

SCADA (Supervisory Control and Data Acquisition) networks are comprised of computers and applications designated to perform integral functions to provide critical services from a...

Importance! Cybersecurity for the Financial Sector

In the wake of the most recent ransomware attacks such as WannaCry, which has crippled a majority of the NHS’s systems, once again the...

Data Defence and Protection

Data defence and protection continues to be a virtual minefield. Everything from hackers hoping to steal intellectual property to botnets targeting en masse the...