News

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

2025-03-10

The Shadow IT Problem No One Talks About

To avoid exposure to breaches & compliance failures, organisations need a proactive approach to simplifying network complexity. By David Brown

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-06

Chinese Hackers Indicted

US Treasury Breach: Dept. of Justice prosecutors have charged 12 Chinese nationals for being part of an alleged hacking campaign.

2025-03-05

Apple Takes Legal Action Over Data Privacy

Investigatory Powers Tribunal: Apple is taking legal action over the UK government efforts to force the company to weaken iCloud encryption.

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-03

Frontend vs Backend vs Full Stack: What’s The Difference?

Full-stack, Backend & Frontend: How does a full stack development company employ each of these skill sets to build seamless digital experiences?

2025-03-03

Cyber Command Ordered To Cease Hacking Russia

Defence Secretary Pete Hegseth has ordered the US military to pause offensive cyber operations against Russian targets.

2025-03-03

President Trump Says Russia Is Not A Cyber Threat

Trump has publicly & privately said that he does not believe Russia presents a cyber threat to US national security or critical infrastructure.

2025-03-03

Obsolete: Skype To Shut Down

The video calling service Skype will close on May 14th 2025, its owner Microsoft has said.

2025-03-04

Orange Group Hacked - User Data Stolen

The alleged breach includes source code, client contracts, project blueprints, and user data, risking operational security & customer privacy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Snow Software

Snow Software

Snow Software is changing the way organizations think about their technology investments, empowering IT and business leaders to drive transformation with precision and agility.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Protek International

Protek International

Protek International delivers world-class Digital Forensics, eDiscovery, Cyber Security, and related Advisory services.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Dynamic Standards International (DSI)

Dynamic Standards International (DSI)

Dynamic Standards International is a global standards development organization which develops certifiable ‘dynamic standards’ that pace with fast-evolving landscapes.