News

2025-02-14

Britain Fast-Tracks Military Recruitment For Cyber Defence

Less Rifle Drill, More Keyboard Drill: New cyber service personnel will have reduced basic training before three months of special cyber training.

2025-02-17

Business Interruption Is The #1 Cyber Risk

Cyber security risk, including ransomware, data breaches and IT disruptions, remain the top business concern worldwide over the past year.

2025-02-17

US Researchers Launch A DeepSeek Competitor

Fine-Tuning: DeepSeek's low-cost development model has been quickly replicated, producing a functioning AI at astonishingly low cost.

2025-02-15

Thai Police Arrest Russian Hackers

Phobos Ransomware: Hackers stole $16m through ransomware attacks targeting Swiss & US targets, affecting over 1,000 victims worldwide.

2025-02-13

US & Britain Refuse to Sign International AI Declaration

Despite being the original champion of international rules for AI Governance, Britain has sided with the US in rejecting the next steps.

2025-02-12

NATO Technology Partner Expands UK Operation

Goldilock: British manufacturing business grows fast to supply demand for its network isolation technology, used to secure critical infrastructure.

2025-02-12

Indian Banks Aim To Reduce Online Fraud

Additional Factor Authentication: A Central Bank initiative to improve the security of cross-border & online payments where a card is not present.

2025-02-12

LinkedIn Is A Focal Point For Cyber Crime

LinkedIn may be a vital tool for job seekers and professionals, but it has also become an open target for cyber criminals exploiting its credibility. 

2025-02-12

AI Love You This Valentine's Day

Fauxmance: With AI, Deepfake and Romance Fraud booming, new McAfee research reveals one in two believe AI chatbots could steal their heart.

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-11

DeepSeek Exposes Sensitive Data

Major Security Issues: DeepSeek sends sensitive data over the Internet without encryption, exposing it to interception & manipulative attacks.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Cyber Observer

Cyber Observer

Cyber Observer’s team specializes in providing corporate officers with comprehensive, visual, real-time performance overview, critical security control (CSC) analysis.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

International Data Sanitization Consortium (IDSC)

International Data Sanitization Consortium (IDSC)

IDSC is a group composed of individuals and companies dedicated to standardizing terminology and practices across the data sanitization industry.

ArmorText

ArmorText

ArmorText offers a seamless channel for communication and collaboration for organizations concerned with keeping communication data private and secure.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Symmetry Systems

Symmetry Systems

Symmetry Systems is a provider of data store and object-level security (DSOS) solutions that give organizations visibility into, and unified access control of, their most valuable data assets.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Suffescom Solutions

Suffescom Solutions

Suffescom Solutions is a leading blockchain development company, assisting businesses in harnessing the true potential of blockchain technology.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.