News

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

2022-05-19

Conti Attack US Precision Engineering Business

A leading maker of aerospace systems has confirmed that it was hit by hackers, who then exposed employees’ personally identifiable information. 

2022-05-19

Never Trust Anything Again - The Zero Trust World

Organisations must abandon the ‘trust everything, but verify’ approach. Never trust. Always verify. Continuously monitor. By Colin Tankard

2022-05-18

A Short History Of Cyber Crime - Part 1- Its Motivations

Cyber crime is human criminal behavior but amplified, empowered & delivered with unprecedented power and greater opportunity for concealment.

2022-05-17

Elon Musk's Deal To Buy Twitter Comes To A Standstill

Twitter is having problems calculating just how many fake accounts are on their platform and it could be Elon Musk wants to renegotiate the terms.

2022-05-23

Why Data Storage Is the Number One Cyber Recovery Strategy

Avert the worst consequences of cyber crime: Create multiple backups of your files, keeping your business safe from major data disasters.

2022-05-18

Google’s New Security Features

Google is giving users much more control over personal privacy and the adverts they are served, as well as better security for online payments.

2022-05-17

British Cyber Security At Risk From Russia

Britain's security Minister and his spy agency chiefs agree that the cyber war in Ukraine is spreading and a nationwide response is needed.

2022-05-17

The Big Cyber Security Threats That You Can Prepare For

No organisation is safe online. There are a wide range of risks and the best defence is awareness of the major types of threat and proper training.

2022-05-17

An Assessment: Pre-Invasion Attacks On Ukraine

More evidence is emerging about the extent and timing of a string of cyber attacks launched on Ukraine just before the invasion began.

2022-05-14

Bitcoin Tanks

Widely used to facilitate cyber crime, frustrate law enforcement, evade regulation and guzzle energy, it turns out Bitcoin is also a lousy investment.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyberlytic

Cyberlytic

Cyberlytic applies artificial intelligence to combat the most sophisticated of web application threats, addressing the growing problem of high volumes of threat data.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Cura Technology

Cura Technology

Cura Technology offers a wide array of security solutions meticulously designed to address specific facets of your security requirements.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

RAH Infotech

RAH Infotech

RAH Infotech is India’s leading value added distributor and solutions provider in the Network and Security domain. We are specialists in Enterprise and App Security and Application Delivery.

Clear Ridge Defense

Clear Ridge Defense

Clear Ridge was founded in April 2015 with the mission and vision to support Joint, Service Cyber Components, and commercial clients in specialized cyber support.

BeckTek

BeckTek

BeckTek specialize in IT Cyber Security & Support, helping clients run their businesses faster, easier and more profitably.

Terra Security

Terra Security

Terra Security is the first agentic-AI platform built for web application penetration testing.

Seamfix

Seamfix

Seamfix helps businesses and their customers globally to seamlessly create, verify and access trusted digital identities and services.