News

2024-10-25

2024 US Presidential Election Cyber Intrusion: Part 4 - Rising Hacktivist Threats

USA 2024 Elections: As the polls narrow, Hacktivists acting on behalf of both Russia & Palestine are intensifying their operations. By Craig Watt

2024-10-25

BRICS Summit: Russia's Foreign Ministry Attacked

Raining On Putin's Parade: Foreign Ministry was hit by a severe cyber attack, that coincided with a high profile BRICS summit in Kazan.

2024-10-25

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?

With economic pressures mounting, the need to modernise outdated IT systems and make smarter security investments is crucial. By Dan Lattimer

2024-10-25

Building Secure Workflows: Using LCNC Platforms For Automating Cybersecurity Tasks

Protecting sensitive data is critical, with increasing pressure on security teams. That's where low-code/no-code (LCNC) platforms come in.

2024-10-18

Four Reasons To Migrate Your Business To The Cloud

A Sound Migration Strategy: Many more companies are adopting cloud computing as a core part of their operations. Here are the reasons why.

2024-10-17

Cybersecurity Education: Preparing the Next Generation of Cyber Defenders 

The online threat environment is worsening and stakeholders must partner and ensure more students enroll in cybersecurity courses.

2024-10-23

The Flawed Reality Of Artificial Intelligence

There is a growing realisation that AI is just another technology tool, with fundamental flaws of which we must be careful. By Ron Marks

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-23

Private Equity Firms Should Make Cybersecurity Diligence A Priority

PE firms hold a wealth of sensitive information and cybersecurity is as important as “Quality of Earnings” for new acquisitions. By Chris Snyder

2024-10-22

How Can Cloud Risk Management Elevate Your Cybersecurity Posture?

With cloud computing, cybercrime has become more sophisticated, with unique risks like misconfigurations & insider threats. By Narendra Sahoo

2024-10-22

Celebrating 10 Years Of Kubernetes

The Journey To Date & What’s Next: Kubernetes is so embedded that it’s almost impossible to imagine life without it. By Rani Osnat

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

SySS

SySS

SySS is a market leader in penetration testing in Germany and Europe.

Avansic

Avansic

Avansic is a leading provider of e-discovery and digital forensics services to attorneys, litigation support teams, and business communities.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Intelligent Business Solutions Cyprus (IBSCY)

Intelligent Business Solutions Cyprus (IBSCY)

IBSCY Ltd is a leading provider of total IT solutions and services in Cyprus specializing in the areas of cloud services and applications, systems integration, IT infrastructure and security.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

Intertec Systems

Intertec Systems

Intertec Systems is an award-winning, global IT solutions and services provider that specializes in digital transformation, cybersecurity, sustainability, and cloud services.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.

Sphinx

Sphinx

Sphinx provide advanced security consulting services and cyber solutions to federal and private industry.