LORCA Cyber

lorca.co.uk

The London Office for Rapid Cybersecurity Advancement (LORCA) supports the most promising cybersecurity innovators in scaling solutions to meet industry’s biggest challenges, while building the UK’s international cybersecurity profile. We do this by delivering bespoke programmes and convening cybersecurity innovators, investors, academics, industry experts, sister programmes and the international community.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

DATA SECURITY

QUSECURE PARTNERS WITH DATABRIDGE SITES

DataBridge Sites | June 15, 2022

news image

QuSecure, Inc., a pioneer in post-quantum cybersecurity (PQC), announced today a collaboration with DataBridge Sites, a cutting-edge data center provider that serves off-site business critical IT environments, to demonstrate its Quantum-as-a-Service (QaaS) orchestration platform QuProtect. QuProtect is the industry's first end-to-end post-quantum cybersecurity software-based solution that uses quantum secure channels to safeguard encrypted communications and data with quantum resilience.
Read More

DATA SECURITY

ERICOM SOFTWARE CONTINUES GLOBAL EXPANSION USING ORACLE CLOUD INFRASTRUCTURE WITH KEY MIDDLE EAST INVESTMENTS

businesswire | December 22, 2020

news image

Ericom Software, an innovator in Zero Trust cloud online protection arrangements and an individual from the Oracle Partner Network (OPN), today reported a development of its Ericom Global Cloud stage server farm presence in the Middle East to help developing interest for Ericom Shield Remote Browser Isolation (RBI). These ventures grow neighborhood admittance to Ericom's internationally appropriated, multi-occupant cloud stage for all associations in the locale. The pace of cy...

Read More

THREAT ACTORS EXPLOIT MICROSOFT'S ONENOTE TO EVADE PHISHING DETECTION

Threatpost | March 04, 2020

news image

The phishing campaign leveraged Microsoft’s digital notebook that automatically saves and syncs notes, to bypass detection tools and download malware onto victims’ systems. OneNote was used as a way to easily experiment wit...

Read More

SIKICH REPORT FINDS THAT MANUFACTURERS AND DISTRIBUTORS NEGLECT KEY CYBERSECURITY ACTIVITIES

Sikich | July 23, 2020

news image

Less than 40% of respondents in Sikich's 2020 Manufacturing and Distribution Report said they perform important data breach prevention activities, such as penetration testing, phishing exercises on employees and assessments of vendors' data security efforts. However, manufacturers and distributors remain vulnerable to breaches. Nearly half of respondents said their companies experienced cyberattacks during the past 12 months."Cybersecurity is an essential part of a company'...

Read More
news image

DATA SECURITY

QUSECURE PARTNERS WITH DATABRIDGE SITES

DataBridge Sites | June 15, 2022

QuSecure, Inc., a pioneer in post-quantum cybersecurity (PQC), announced today a collaboration with DataBridge Sites, a cutting-edge data center provider that serves off-site business critical IT environments, to demonstrate its Quantum-as-a-Service (QaaS) orchestration platform QuProtect. QuProtect is the industry's first end-to-end post-quantum cybersecurity software-based solution that uses quantum secure channels to safeguard encrypted communications and data with quantum resilience.
Read More

news image

DATA SECURITY

ERICOM SOFTWARE CONTINUES GLOBAL EXPANSION USING ORACLE CLOUD INFRASTRUCTURE WITH KEY MIDDLE EAST INVESTMENTS

businesswire | December 22, 2020

Ericom Software, an innovator in Zero Trust cloud online protection arrangements and an individual from the Oracle Partner Network (OPN), today reported a development of its Ericom Global Cloud stage server farm presence in the Middle East to help developing interest for Ericom Shield Remote Browser Isolation (RBI). These ventures grow neighborhood admittance to Ericom's internationally appropriated, multi-occupant cloud stage for all associations in the locale. The pace of cy...

Read More
news image

THREAT ACTORS EXPLOIT MICROSOFT'S ONENOTE TO EVADE PHISHING DETECTION

Threatpost | March 04, 2020

The phishing campaign leveraged Microsoft’s digital notebook that automatically saves and syncs notes, to bypass detection tools and download malware onto victims’ systems. OneNote was used as a way to easily experiment wit...

Read More
news image

SIKICH REPORT FINDS THAT MANUFACTURERS AND DISTRIBUTORS NEGLECT KEY CYBERSECURITY ACTIVITIES

Sikich | July 23, 2020

Less than 40% of respondents in Sikich's 2020 Manufacturing and Distribution Report said they perform important data breach prevention activities, such as penetration testing, phishing exercises on employees and assessments of vendors' data security efforts. However, manufacturers and distributors remain vulnerable to breaches. Nearly half of respondents said their companies experienced cyberattacks during the past 12 months."Cybersecurity is an essential part of a company'...

Read More

Resources

resource image

DATA SECURITY, SOFTWARE SECURITY

What is The Future of Cybersecurity

Video

resource image

DATA SECURITY, ENTERPRISE IDENTITY, PLATFORM SECURITY

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

Whitepaper

resource image

DATA SECURITY, SOFTWARE SECURITY

What is The Future of Cybersecurity

Video

resource image

DATA SECURITY, ENTERPRISE IDENTITY, PLATFORM SECURITY

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

Whitepaper

resource image

DATA SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

Whitepaper

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us