News

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2022-01-03

Belgium’s Military Suffer From Log4j Attack

The Belgian Defence Ministry's computer network is being restored to full operation following an attack delivered via Log4shell vulnerabilities.

2021-12-22

Britain's HMRC Tax Agency Admits Numerous Data Breaches

The HMRC has disclosed 17 breaches in 15 months from 2020, affecting 3,000 individuals, as a result of unauthorised changes to personal records.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

2021-12-31

British Plan To Become A ‘Global Cyber Power’ In 2022

Britain plans to advance in cyberspace and will support its workforce & industry in upgrading the technologies vital to developing its cyber power.

2021-12-24

Log4j Cyber Security Flaw Seriously Concerns Experts

The Log4j vulnerability is being widely exploited by a growing number of threat actors, prompting government officials to take action.

2021-12-22

Cyber Revolution In The Media & Entertainment Industry

Media & Entertainment companies are increasingly becoming targets for cyber crime as their business models swiftly evolve in the digital era.

2021-12-22

Microsoft's New AI Debugging Tool

BugLab: Microsoft’s concept is to develop an AI that can automatically find and repair software bugs using a 'hide and seek' game as the model.

2021-12-21

The Pentagon Needs To Change How It Does AI

The US Defense establishment needs a more integrated approach to AI if it is to translate its technical capabilities into effective military tools.

2021-12-21

Stealthy Malware Hiding Behind An Invalid Date

e-Commerce At Risk: A highly sophisticated malware targeting online stores, CronRAT is undetected by many antivirus engines.

2021-12-20

Protecting Your E-Commerce Business Against Ransomware Attacks

Online sales are soaring and businesses are building their digital presence, but they must ensure their cyber security keeps pace. By Neville Louzado

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Detectify

Detectify

Detectify is a web security service that simulates automated hacker attacks on your website, detecting critical security issues before real hackers do.

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Giesecke+Devrient (G+D)

Giesecke+Devrient (G+D)

Giesecke+Devrient develop security technologies in four major areas: enabling secure payment, providing trusted connectivity, safeguarding identities and protecting digital infrastructures.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER)

US Marine Corps Forces Cyberspace Command (MARFORCYBER) conducts full spectrum military cyberspace operations in order to enable freedom of action in cyberspace and deny the same to the adversary.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.