News

2024-11-26

British Government Minister Predicts Russia Will Step Up Cyber Attacks 

Shut Down The Power Grid: Russia is ready to carry out cyber attacks on the UK and its NATO allies in a bid to weaken support for Ukraine.

2024-11-25

Why Insider Threats Remain The “Wild Card” In Cybersecurity

There has been a big surge in insider threat incidents, with the average cost of each occurrence now reaching $15.38 million. By Miguel Clarke

2024-11-22

Google Invests In U.S. Education With 15 New Cybersecurity Clinics

Google aims to supercharge fifteen US universities & colleges by investing $1 million in in their capacity to improve cybersecurity standards.

2024-11-25

Protecting Patient Privacy: Cybersecurity Priorities For Healthcare

Healthcare professionals & clinicians at all levels have a vital role to play in keeping hospital networks safe and patient data protected.

2024-11-22

Practice Makes Perfect For Incident Response

In any pressured situation, being practiced and prepared removes a lot of the stress and makes people more effective. By Gemma Moore

2024-11-22

Google Faces Order To Divest Chrome

Legal Remedy: A US court ruling that Chrome operates a monopoly in Inernet search may soon result in Google being ordered to sell the business.

2024-11-22

AI Can Revolutionise Science

Acceleration: AI is one of science’s greatest achievements and is now poised to revolutionise science itself in several critical areas of research.

2024-11-22

The Importance Of Cyber Security In Safeguarding E-Commerce Businesses

The stability of e-commerce platforms cannot be considered ‘one and done’ measures. They require constant vigilance & adaptability from providers.

2024-11-21

Hamas Affiliates Attacking Israel

A group named WIRTE has been identified targeting Israeli infrastructure, as well as the Palestinian Authority, Jordan, Iraq, Saudi Arabia & Egypt.

2024-11-21

Using AI In Classrooms Is A Test Of Public Trust

Trust is a cornerstone for successful AI implementation. There needs to be a gradual build-up of trust rather than a jarring change. By Rob Johnson

2024-11-20

Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted & proportionate” measures to stop terrorist content.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

Orpheus Cyber

Orpheus Cyber

Orpheus Cyber provides predictive and actionable intelligence to our clients - enabling them to anticipate, prepare for and respond to the cyber threats they face.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.