News

2023-09-08

Qakbot Malware Taken Down

Qakbot malware infected victims via spam emails with malicious attachments, links and served as a platform for ransomware operators. 

2023-09-07

Can Shortening The Cyber Stack Increase Stability?

More Is Not Better: CISOs would derive more benefit from improving control over the stack rather than buying in more tools. By Tim Wallen

2023-09-07

The Unique TTPs Attackers Use To Target APIs

Application Programming Interfaces are the gateways to key data, and attackers will go to extraordinary lengths to compromise them. By Andy Mills

2023-09-06

Establishing A Digital Immune System

Creating The Self-Healing Enterprise With DIS: Why immunity should be your new favourite cybersecurity metaphor. By Matt Tuson

2023-09-06

LockBit Hacked British Military Data 

Details are emerging about how LockBit got access to top secret military data via a metal fence manufacturer running 20-year-old software.

2023-09-06

How To Check If A Link Is Safe

Malicious Links - A Step-by-Step Guide: Everyone connected to the Internet needs to learn how to test links for viruses and other hidden dangers. 

2023-09-05

Hackers Hit British Defence Ministry

Supply Chain Hack: Top secret security information on British military & intelligence sites has been leaked by hackers linked to Russia.

2023-09-04

Hackers Target Satellites 

Timing Systems, GPS & Communications: Orbital satellites keep the world running smoothly but have just the same vulnerability as ground facilities.

2023-09-06

Virtual Event: How to make SIEM grow with your organization

Webinar | Sept. 21st | SANS and AWS experts share how to ensure tailored cybersecurity solutions with Security Information & Event Management (SIEM).

2023-09-04

How To Combat Cyber Security Burnout

Burnout Syndrome Is Real: Stop this happening to your cyber security team by automating and consolidating technologies. By Diana Harter

2023-09-01

Navigating User Experience, Performance & Security

Striking The Balance: Are great user experience and stringent security protocols compatible with a well-performing website? By Gav Winter

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Infosec Partners

Infosec Partners

Whether you’re looking for complete managed security or an on-call expert advisor, we offer a range of managed security services to complement your internal team or primary outsource partner.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Voxility

Voxility

Voxility provides Infrastructure-as-a-Service in the biggest Internet hubs in the world.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

BAE Systems

BAE Systems

BAE Systems develop, engineer, manufacture, and support products and systems to deliver military capability, protect national security, and keep critical information and infrastructure secure.

Deloitte

Deloitte

Deloitte is a multinational professional services firm providing audit, consulting, financial advisory, risk management, tax, and related services to clients.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

NORMA Cyber

NORMA Cyber

NORMA Cyber delivers centralised cyber security services to Norwegian shipowners and other entities within the Norwegian maritime sector.

Sattrix Information Security

Sattrix Information Security

Sattrix Information Security helps small, mid, and large enterprises in the area of digital transformation with a focus on information security.

Oktacron

Oktacron

Oktacron is a company specialized in cybersecurity, guided by the principle that at every moment, in every approach, and with all technologies, one should stay one step ahead of attackers.