News

2024-11-29

How AI Is Reshaping The Cybersecurity Landscape 

ChatGPT Turns Two: Generative AI has revolutionised countless industries, including cybersecurity. A discussion with Alex Rice & Darren Thomson.

2024-11-27

Cybersecurity Essentials For Laptop Gamers

Understanding the basics of cybersecurity for laptop gamers allows you to enjoy online gaming without fear of a compromised device & stolen identity.

2024-11-29

From Credentials To Identity: Understanding Digital Identity & Access

Proactive security strategies, continuous monitoring & education are key to combat the threat of credential misuse & identity theft. By Ford Merril

2024-11-27

Russian State-Sponsored Hacking Extends Worldwide

A damaging Russian espionage campaign has been striking government agencies and other institutions in Central Asia, Ukraine & NATO members.

2024-11-27

Meta Deletes 2 Million Fake Social Media Accounts 

Meta has deployed a range of measures to detect and stop fraud across its platforms, including Facebook, Instagram, WhatsApp & Messenger.

2024-11-26

What The US’s Foggy AI Regulations Mean For Today’s Cyber Compliance

The US government's regulatory inclination to let AI developers do their own thing is a growing concern for the vast majority of businesses.

2024-11-26

The Problem With Generative AI - Leaky Data

Confidential computing allows data to be input into a Gen- AI model and the data to be securely processed without leaking. By Samuel Tourbot

2024-11-23

Phishing Scheme That Generated $11M Taken Down

Scattered Spider: Charges of using text messages to extract victims' personal information as a gateway to steal millions in crypto currency.

2024-11-25

Hackers Steal $10M Via LinkedIn

North Korean hackers masquerading as recruiters for high profile financial services firms using LinkedIn to contact prospective targets.

2024-11-26

Cyber Attacks On Britain's Water Supply

Across critical national infrastructure sectors, more incidents have been reported this year than ever, with drinking water one of the most affected.

2024-11-26

Taking The You Out Of USB

How Businesses Can Reduce Risk: USBs are a particular concern for air gapped networks where defence relies on segregation.  By Jon Fielding

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Altipeak Security

Altipeak Security

Altipeak Security provide Safewalk - a flexible and robust authentication platform through which we offer improved security to SMBs, corporates, banks, insurance companies, healthcare and more.

Startup Wise Guys

Startup Wise Guys

Startup Wise Guys is a mentorship-driven accelerator program for early stage B2B SaaS, Fintech, Cybersecurity & Defense AI startups.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

PrivacySavvy

PrivacySavvy

PrivacySavvy's mission is to provide you with all the information that you need to ensure that your internet privacy is intact, your devices are secure, and that any time you step online, you’re safe.

Conference on Applied Machine Learning in Information Security (CAMLIS)

Conference on Applied Machine Learning in Information Security (CAMLIS)

CAMLIS is a venue for discussing applied research on machine learning, deep learning and data science in information security.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

McDonald Hopkins

McDonald Hopkins

McDonald Hopkins is a business advisory and advocacy law firm. We focus on insightful legal solutions that help our clients strategically plan for an increasingly competitive future.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

Trofi Security

Trofi Security

Trofi Security provides Information Technology and Information Security services to organizations in both the public and private sectors.