News

2024-12-04

Empowering Women To Take On More Roles In Cybersecurity

Bridging The Gap in Cybersecurity Roles: Diversity is crucial in cybersecurity & improves the overall defense of organizations. By Nazy Fouladirad

2024-12-03

What Is A Threat Exposure Management Platform & Does Your Company Need One?

With a rise in cyberattacks, businesses must consider new ways to protect themselves. Is a Threat Exposure management platform right for you?

2024-12-03

Britain's Cyber Risk Is “Widely Underestimated” 

The UK must wake up to the severity of the cyber threat, according to the National Cyber Security Centre, as its new Director speaks on the record.

2024-12-03

Artificial Intelligence Steps Into The Boardroom

Business leaders won’t be happy to use AI in the boardroom before they understand how the apparent risks are being mitigated. By Nail & Whittaker

2024-12-03

US Citizen Jailed For Cyber Espionage

A US citizen has been sentenced to jail for spying and sharing sensitive information about his employers with China's domestic intelligence agency.

2024-12-03

Iranian Hackers Are Exploiting LinkedIn

SnailResin: A fake recruitment campaign targeting LinkedIn users working in the aerospace industry used to deliver elusive malicious malware.

2024-12-03

Four Evolving Trends Every Business Leader Should Be Aware Of

Cybersecurity In 2025: Companies really need to embrace best practices & build strong foundational security policies to stay ahead. By Luke Dash

2024-12-02

Attacks On The US From China Increasing

Critical Infrastructure: Chinese cyber attacks form part of a broader strategy to disrupt US operational capabilities in the event of conflict. 

2024-12-02

Is Zero Trust The Future Of Cybersecurity?

A zero-trust architecture is especially effective for organizations that use cloud applications and have lots of remote workers and locations.

2024-12-02

AI Used For Extortion & Sexual Abuse

Paedophiles, scammers, and criminal hackers are increasingly using Artificial Intelligence to attack their victims, a senior police officer warns.

2024-12-02

2025: A New Year Of Cybersecurity Challenges

Certainty Of Cyberthreats: Leaders should cultivate a culture of vigilance, encouraging employees to beware of the unexpected. By John Mutuski

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TrustedSec

TrustedSec

TrustedSec is an information security consulting services, providing tailored solutions and services for small, mid, and large businesses.

DoD Cyber Crime Center (DC3) - USA

DoD Cyber Crime Center (DC3) - USA

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Secure Source

Secure Source

Secure Source specialise in search and recruitment for Cyber Security and Security Cleared markets.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

AppViewX

AppViewX

AppViewX is a global leader in the management, automation and orchestration of network services in data centers.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Gray Analytics

Gray Analytics

Gray Analytics is a Cybersecurity Risk Management company providing best-practice services across a broad spectrum of cyber scenarios for both government and commercial customers.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Mobb

Mobb

Mobb's AI-powered technology automates vulnerability remediations to significantly reduce security backlogs and free developers to focus on innovation.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.