News

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-03-25

Manus - A Fully Autonomous Artificial Intelligence

Far-Reaching Implications: Manus operates autonomously, can multi-task seamlessly and complete jobs without instructions or human interaction.

2025-03-26

The Leading Russian Cyber Security Companies

Russian is strengthening its national cyber defences by requiring commercial organisations to connect to a unified cyber security system.

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Scince & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

2025-03-25

23andMe Goes Bankrupt Following Disastrous Data Breach

Millions of people will find that their DNA data has been put up for sale, as the human genetics company enters Chapter 11 administration.

2025-03-31

MS Windows Zero Day Vulnerability Widely Exploited

Update: A known security flaw in Microsoft Windows has been used by numerous state-sponsored groups for data theft and espionage since 2017.

2025-03-25

Taiwanese Hackers Accused Of Attacking China

There have been attacks targeting China's key infrastructure, including power grids, water supplies & telecommunications networks, since 2023.

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

2025-03-25

Ukraine Railway Systems Attacked By Russian Hackers

A systematic, complex, and multi-level attack has taken down the national railway's online portal, rendering the sale of tickets online impossible.

2025-03-30

Sign up for our FREE Weekly Newsletter

Curated news content on essential cybersecurity matters for decision-makers and specialists across the corporate and institutional sectors.

2025-03-24

Hidden Risks In The The Global Supply Chain

Even the most security-conscious companies are vulnerable to weaknesses in their supply chain. They must work harder to close security gaps.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

BI.ZONE

BI.ZONE

BI.ZONE creates high-tech products and solutions to protect IT infrastructures and applications, and provides services from cyber intelligence and proactive defence to cybercrime investigation.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Technology Innovation & Startup Centre (TISC)

Technology Innovation & Startup Centre (TISC)

TISC is a startup incubator at the Indian Institute of Technology Jodhpur (IITJ) and we back deep-tech startups.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Defimoon

Defimoon

DeFimoon is the International Blockchain Development & Security Agency. We provide professional services and solutions at the highest quality on world-leading chains.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions (ICS)

Integrated Cyber Solutions is a managed security service provider that humanizes cybersecurity managed services to the Small-to-Medium Business (SMB) and Small-to-Medium Enterprise (SME) sectors.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.