News

2023-08-21

X Will Fund Claims Made By Unfairly Treated Users

Elon Musk says that X (Twitter) will pay legal bills for those treated unfairly by their employer for their activity on his social media platform.

2023-08-21

‘Bitcoin Bonnie & Clyde’ Go To Jail 

Crocodile Of Wall Street: A husband and wife cyber crime team have pleaded guilty to trying to launder $4.5bn of stolen Bitcoin.

2023-08-21

EvilProxy Hits Microsoft 365 Business Accounts

A phishing campaign using the EvilProxy PhaaS tool has been identified targeting Microsoft 365 user accounts of C-level executives and managers.

2023-08-21

US Defense Agency Announces Major AI Challenge

DARPA has launched a two-year cybersecurity competition that will use Artificial Intelligence to protect the United States’ most important software.

2023-08-21

US Military Offers A Reward To Satellite Hackers

Since 2020, the US military has been staging a satellite hacking contest at the DEFCON convention. This time, they can get to do it for real.

2023-08-19

Police Error Exposes Personal Data Of Crime Victims

British police forces mistakenly released the data of 1,230 people, wrongly included in the files responding to freedom of information requests.

2023-08-19

How SMEs Can Achieve Cyber Resilience

For big businesses the consequence of a cyber attack can be very costly. For smaller organisations, they can be devastating. By Tom Egglestone

2023-08-16

The UN Cybercrime Convention Could Help & Harm Victims

The proposed UN cybercrime convention has both risks & opportunities for protecting vulnerable groups. By Isabella Wilkinson & Amrit Swali

2023-08-16

Staying Ahead Of Cyberthreats

Best Cybersecurity Practices For Businesses Of All Sizes: In the digital world cybersecurity is no longer an option for businesses, but a necessity.

2023-08-15

Protecting Against The $6.7Bn SMS Pumping Fraud Scam

Warning: Criminals can exploit businesses who use SMS One-Time Passwords as part of a two-factor authentication process. By Paul McGuire 

2023-08-15

Beyond Traditional Security

Embracing CNAPP For Enhanced Cloud Application Protection: One of the most viable solutions to enhance app security in the modern setting.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Clearwater Security & Compliance

Clearwater Security & Compliance

Clearwater Compliance specialize in Privacy, Security, Compliance and Risk Management Solutions for Health Care, Law Firms and other businesses.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

ThreatGen

ThreatGen

ThreatGEN™ works with your team to improve your resiliency and industrial cybersecurity capabilities through an innovative and modernized approach to training and services.

At-Bay

At-Bay

At-Bay is the world’s first InsurSec provider designed from the ground up to help businesses tackle cyber risk head on.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

NSR

NSR

NSR provide trusted solutions that deliver positive business outcomes for our clients in cybersecurity and data protection challenges.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

LaScala

LaScala

LaScala is an IT Managed Services provider delivering technical, security, and compliance solutions with dedication, compassion, and agility.

Nokod Security

Nokod Security

Nokod Security delivers an application security platform for low-code / no-code custom applications and Robotic Process Automation (RPA).

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.