News

2023-09-07

Why Are WhatsApp Users So Easy To Scam?

Scammers Are Relentlessly Targeting WhatsApp Users: Eight effective steps you can take to keep yourself safe (updated). By François Rodriguez

2023-09-01

Empower Your DaaS Programs

Classroom Security: Managed cybersecurity service features like Device-as-a-Service can provide a competitive edge for schools. By Nadav Avni

2023-09-01

Seiko Attacked By BlackCat

The Seiko electronics company has been hacked by the BlackCat cyber crime group, who have published stolen data as an extortion threat.

2023-08-31

Hospital IoT & IoMT Cyber Security Risk

Healthcare Faces Unique Cyber Security Challenges: A new report highlights the complexity and costs of IoT in the medical sector.

2023-08-31

Duolingo Leaks The Data Of 2.6 Million Users

Personal Data Scraped From An Exposed API: One of the largest online language learning sites in the world has fallen victim to a data breach.

2023-08-30

Flight Traffic Chaos

Faulty Data, Human Error Or Hostile Action? Britain's air traffic control system suffers severe disruption & long delays, with no clear explanation.

2023-08-30

He's Back Again...

Trump Breaks Silence On X (Twitter): Following suspension, Trump's return post received more than 36 million views and 530,000 likes.

2023-08-29

Reimagining Your Cyber Infrastructure

From Security To Resiliency: Organisations should focus on reducing the chances of a breach by reducing their attack surface. By Duncan Bradley

2023-08-29

Undetected Attackers Could Be Inside Your IT Systems Now

The starting point for cyber criminals is to find a way into a target’s network - in the majority of cases that begins by exploiting a human error.

2023-08-29

NIS2 Regulations Are Coming – Are You Ready?

EU Network & Information Security Rules: Tighter rules and tougher sanctions will apply to more organisations than before. By Graham Hawkey

2023-08-28

British Police On High Alert After Supply Chain Breach

London's Metropolitan Police issue a serious alert as cyber criminals breach an IT supplier responsible for ID cards and restricted access passes.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

tietoevry

tietoevry

Tietoevry creates digital advantage for businesses and society. We are a leading digital services and software company with local presence and global capabilities.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

SterlingRisk Programs

SterlingRisk Programs

SterlingRisk’s Cyber practice brings experience working with a wide array of clients across a broad spectrum of industries.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

OmniCyber Security

OmniCyber Security

Omni is a cyber security firm specialising in Penetration Testing, Managed Security and Compliance.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

Port443

Port443

Port443 specialises in providing Security Orchestration, Automation and Remediation (SOAR) "as a service".

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.