News

2023-05-15

Cyber Security And Ransomware Attacks - Problems & Solutions

Stay Ahead Of The Criminals: Five best practices will help you create a roadmap for a comprehensive ransomware prevention strategy. 

2023-05-05

Phishing Attacks Surge As Cyber Criminals Exploit New AI Tools

Beating 2FA: AI tools can help threat actors craft convincing phishing messages that are devoid of some typical indicators of a phishing attempt. 

2023-05-03

Retrofixing The Remote Workforce

Combining technologies over a single platform can provide a cohesive security solution that can monitor endpoints & network access. By Tim Wallen

2023-05-03

Is ISO 27001 Worth It?

The Only Auditable International Standard For Information Security: What are the relative pros & cons of ISO 27001 - is it worth it? By Phil Robinson

2023-05-03

Why Zero Trust Is Fundamental In Today’s Economic Climate

Harnessing affordable zero trust architecture based solutions is preferable to investing in multiple expensive solutions. By Dominik Birgelen

2023-05-01

Google Bans Thousands Of Malicious Developers

App Attacks: Google says it has blocked 173,000 malicious developers and fraud rings preventing over $2 billion in fraudulent transactions.

2023-05-01

‘Tyrannical IT’ Is A Critical Threat

Misinformation & Disinformation: Authoritarian countries increasingly rely on digital tools to suppress dissent both inside & beyond their borders.

2023-05-01

Iranian Hackers Targeted Israel

Iranian state-sponsored threat hackers are deploying an updated backdoor apparently targeting Israeli academic researchers with an interest in Iraq.

2023-04-27

Facebook Delivers Fake Reviews

Research by consumer group Which? shows that there are many fake review factories on Facebook - despite the risk of fines from regulators.

2023-04-27

Violent Indian Separatists Using Twitter Bots

Recent research reveals pro-Khalistani Sikh groups using Twitter bots to promote violence and anti-India propaganda across social media.

2023-04-25

Locked Shields - NATO’s 2023 Cyber Exercise

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) recently hosted the 2023 edition of the annual cyber defense exercise.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

StratoKey

StratoKey

StratoKey is an intelligent Cloud Access Security Broker (CASB) that secures your cloud and SaaS applications against data breaches, so you can do secure and compliant business in the cloud.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Industrial Cyber-Physical Systems Center (iCyPhy)

Industrial Cyber-Physical Systems Center (iCyPhy)

The goal of iCyPhy is to conduct pre-competitive research on architectures and design, modeling, and analysis techniques for cyber-physical systems.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

SMARTEST

SMARTEST

SMARTEST is a world-class IT solutions provider active in the most challenging and demanding industries such as the oil and gas industries.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

Lumenir Cybersecurity

Lumenir Cybersecurity

Lumenir is the cybersecurity solution developed by Laminar, an Australian IT and communications company with a long history of supporting critical industries across the country.