News

2023-03-29

World Backup Day 

Securing DevOps: Don't neglect to backup the types of data that are often overlooked, but the loss of which can lead to serious consequences.

2023-03-28

ChatGPT Language Model Risks

AI chatbots and Large Language Models (LLMs) present a rising security threat, the British National Cyber Security Agency has warned.

2023-03-28

Russia's Disinformation Campaign Targets Ukraine's Supporters

More than sixty 'lookalike' fake news websites set up to pass off as legitimate Western newspapers used to deliver fake news on social media.

2023-03-28

TikTok’s CEO Interrogated Over Data Privacy

The short-form video app TikTok has many millions of US users, raising suspicion that their data could be accessed by the Chinese government. 

2023-03-27

NCSC Launches Services For Small Firms To Be Safe Online

Equipping small firms with the right tools and tailor-made guidance, enabling them to be more cyber resilient and in turn reduce real world costs.

2023-04-01

Simplifying Workflows With Centralized Tools & Automation    

From Mundane To Marvellous: A cohesive ecosystem of sysadmin tools that work seamlessly together, rather than a clutter of stand-alone tools.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

2023-03-27

Ferrari Hacked & Ransom Demanded

The famous Italian sports car maker Ferrari has said it has been a victim of a cyber attack that targeted confidential customer information.

2023-03-22

Jackpotting Attacks Are Back - But Banks Can Fight Back

FiXS infects multiple ATM models, corrupting the middleware which runs the hardware - including the cash dispenser. By Juan Ramon Aramendia

2023-03-22

Britain Pledges To Invest £2.5bn In Quantum Computing

Ambitious National Plan For AI: "A world-leading quantum-enabled economy by 2033" with a £2.5bn research and innovation programme

2023-03-22

US Federal Agency Hacked 

Multiple cyber criminals, including a nation state- hacking group, have exploited a known unpatched vulnerability, going undetected for four years.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Metasploit

Metasploit

Metasploit penetration testing software helps find security issues, verify vulnerabilities and manage security assessments.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

MaxMind

MaxMind

MaxMind is an industry-leading provider of IP intelligence and online fraud detection tools.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Awen Collective

Awen Collective

Awen Collective develops software-based tools for performing Digital Forensics, Incident Response and Cyber-Crime Investigation.

Arsenal Recon

Arsenal Recon

Arsenal Recon are digital forensics experts, providing consultancy services and powerful software tools to improve the analysis of electronic evidence.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

NSO Group

NSO Group

NSO Group develops technology that enables government intelligence and law enforcement agencies to prevent and investigate terrorism and crime.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

Cyber Dacians

Cyber Dacians

Cyber Dacians offers Information and Cyber Security Consulting Services. We help you to test the effectiveness of your security defenses and build a secure infrastructure.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

DoControl

DoControl

DoControl gives organizations the automated, self-service tools they need for SaaS applications data access monitoring, orchestration, and remediation.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.