News

2023-10-09

The US Security Standard For IoT Devices

Internet of Things: The expansively growing number of smart products already connected to networks bring enormous security challenges.

2023-10-04

China Accuses The US Of Spying On Huawei

Huawei Compromised & Data Stolen: The escalating conflict between the US and China over technology and security issues reaches a new level.

2023-10-04

British Online Safety Bill Will Restrict Social Media

Parliament has passed a controversial new law aimed at making social media firms more responsible for users' safety on their platforms.

2023-10-08

AI-Powered Cyber Security Software For SMEs & Consumers

Acronis claim that its new AI-based security product is the ultimate must-have solution for individuals, families, and small businesses.

2023-10-06

Cyber Criminals Exploit Legitimate Software

Remcos & GuLoader: Research has found malicious trojans packaged with legitimate software widley available from criminally complicit vendors.

2023-10-02

The Battlefield Transformed

Armed Conflict Is Changing: Disruption of critical infrastructure is the first strike in cyber warfare, with the aim of creating chaos.

2023-09-27

Neuromorphic Computing Changes Machine Learning

Hardware & Software Elements: A method of computer engineering in which aspects of a computer are modeled like the human brain & nervous systems.

2023-09-25

Cyber War Crimes Will Be Prosecuted

The International Criminal Court is set to investigate and prosecute cyber war crimes in the way it investigates kinetic and physical war crimes.  

2023-09-26

Update: The 2023 Malware League Table

The Education & Research sector is ranked as the most affected industry globally, with Communications overtaking Healthcare for the first time.

2023-09-26

US National Cyber Security Strategy Moves On

The White House already has a new national cyber strategy. So does CISA and the Pentagon. Now, the US State Department wants one too.

2023-09-26

Quadruple Extortion  Ransomware

Phases Of The Extortion Cycle: Criminals are getting more focused, specialized & effective in maximizing the ransom they extract from their victims.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

Cyber DriveWare

Cyber DriveWare

DriveWare analyzes new traffic in the I/O layer and blocks malware and cyber attacks which organizations have no means to protect against.

Core Security

Core Security

Core Security provides threat-aware identity, access, authentication and vulnerability management solutions.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Prosperoware

Prosperoware

Prosperoware develop software for cybersecurity, privacy, and regulatory compliance for content systems, and financial matter management.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

5S Technologies

5S Technologies

5S Technologies is a regional IT solutions and services provider based in Cary, NC and serving the Carolinas.

CloudQuery

CloudQuery

CloudQuery - bringing clarity into cloud infrastructure. The developer-first cloud governance platform for full visibility into security, compliance, and cost.

Highway Ventures

Highway Ventures

HIGHWAY Ventures is a startup studio that builds cybersecurity and vertical AI companies in Northwest Arkansas from technology developed within the federal lab ecosystem.