News

2023-11-09

Securing Kubernetes Helm: Vulnerabilities & Defensive Strategies

Kubernetes is becoming part of the mainstream IT landscape, used to run mission critical workloads both on-premises and in the cloud. 

2023-11-08

Time To Get Serious About Defence

Once sensitive data has been stolen its confidentiality is lost forever - that’s why a proactive approach is so important. By Gavin Millard

2023-11-02

Major Outage: British Library Suffers A Cyber Attack

Education In The Crosshairs: Research centres across the UK are facing attacks from cyber criminals - Britain's national library is the latest victim.

2023-11-02

Ransomware Attacks Hit A Record High

It's not just criminals who want to get your personal information for financial gain. Many popular Apps are legitimately scraping your personal data.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-11-03

Bletchley Declaration On Artificial Intelligence Gets International Support

Regulating AI: An international declaration to address risks with the technology, as well as a multilateral agreement to test advanced AI Models.

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

2023-11-06

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

Join this webinar to hear security experts from SANS and AWS share what a next-generation firewall is and how it redefines the concept of a firewall.

2023-11-06

Phishing Is The Hackers' Favourite Tool

Phishing is often the first stage of a larger attack, leading to data breaches, malware, ransom, identity theft & other serious consequences. 

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-12-30

2023 - A Significant Year For Cyber Incidents

2023 was a year of serious, damaging cyber threats and attacks. Criminals were relentless in their methods, becoming faster & more sophisticated.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Qualitest Group

Qualitest Group

Qualitest is the world’s largest pure play Quality Assurance and software testing company.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Lanner Electronics

Lanner Electronics

Lanner Electronics is a leading hardware provider for advanced network appliances and industrial automation solutions including cyber security.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Cybersecurity & Infrastructure Security Agency (CISA) - USA

Cybersecurity & Infrastructure Security Agency (CISA) - USA

CISA leads the national effort to defend critical infrastructure against the threats of today and to secure against the evolving risks of tomorrow.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Axxum Technologies

Axxum Technologies

Axxum Technologies is a premier provider of Network Communications and Information Technology Security Solutions.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Yarix

Yarix

Yarix is the leading company in Var Group’s Digital Security division and one of the most recognised, innovative and authoritative Italian companies in the IT security sector.

Pointsharp

Pointsharp

Pointsharp delivers software and services that help organizations secure data, identities, and access in a user-friendly way.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.