News

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-25

Is Your Business Ready To Embrace Artificial Intelligence? 

AI presents itself in a different way - it’s an entirely new area that requires continuous development and a new set of rules. By Andy Dunn

2023-09-25

Unmasking The Silent Threat Of Cryptojacking 

Zombie Devices: Unlike ransomware, cryptojackers want to remain in the system for as long and quietly as possible. By Spencer Starkey

2023-09-25

Zero-Trust: Protecting From Insider Threats

Unintended Consequences: Organisations need to constantly guard against insider threats - the cybersecurity risk that comes from within.

2023-09-22

Europol Identifies The Top Cyber Threats

Ransomware affiliate programs have become the main business model for ransomware groups, deploying multi-layered extortion techniques.

2023-09-22

Jargon Buster: Untangling The Complexity In Cybersecurity 

Device Security Affects Us All: Wouldn’t it be helpful to return to basics to explain & design security in a much easier way? By Chris Meidinger

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-09-21

Australian Government Suffers A Widespread Ransom Attack

Prolific ransomware group ALPHV hacked a law firm providing services to numerous government agencies, facilitating a wave of secondary attacks.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Ionic Security

Ionic Security

Ionic provide a high-assurance data protection and control platform built on strong encryption, fine-grain control and contextual analytics.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

SGBox

SGBox

SGBox is a highly flexible and scalable solution for IT security. Choose the modules which your company needs and implement it without any modification to your network infrastructure.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.

StepSecurity

StepSecurity

StepSecurity provides a comprehensive security platform for GitHub Actions.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Quantum Dice

Quantum Dice

Quantum Dice is an award-winning venture-backed spinout from Oxford University’s world-renowned quantum optics laboratory.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.

Lithuanian Cyber Command (LTCYBERCOM)

Lithuanian Cyber Command (LTCYBERCOM)

The Lithuanian Cyber Command is responsible for planning and execution of operations in cyberspace and installation of strategic and operational communications and information systems.

BlackSwan Technologies

BlackSwan Technologies

BlackSwan Technologies is reinventing enterprise software through Agile Intelligence for the Enterprise – a fusion of data, artificial intelligence, and cloud technologies.

REAL Security

REAL Security

REAL Security is a market leader across the Adriatic region in value-added distribution in the field of IT Security & virtualisation.