News

2024-08-05

Russian Cyberwar Methods Are Evolving

Russia's changing priorities may be an indication that cyber weapons are becoming a more effective alternative to their conventional weapons.

2024-08-05

Cyber Crime Hothouses In Myanmar

Slave Labour: Online fraud in Southeast Asia is continuing to grow, with organised crime syndicates generating an estimated $64 billion annually.

2024-08-05

App Security Testing: Exploring The Pros & Cons Of Different ApproachesĀ 

Understanding Emerging Technology Risks: It is important to be familiar with the different approaches in app security to choose the right solutions.

2024-08-02

Dark Angels Score Record Breaking $75m Ransom

Extortion Pays: ThreatLabz has uncovered a victim who paid Dark Angels $75 million in ransom, higher than any previous publicly known amount.

2024-08-02

Hackers Target Maritime Facilities With Malware

Sidewinder: An Indian APT using spear-phishing to deliver malicious payloads to conduct espionage and trigger new chains of attack.

2024-08-01

AI At The Paris 2024 Olympics

The 2024 Games are using AI tools across many applications. But the large amounts of data being generated risk being used for malicious purposes.

2024-07-31

Electric Vehicle Charging Stations Are Here - Will Cyberattacks Follow?

A Soft Target: Cybercriminals who focus on targeting EV charging stations have the capability to launch attacks right across the local grid.

2024-07-31

DDoS Attack Knocks Azure Offline

Intermittent Downtime: Cyber security teams had to scramble to deal with the widespread incident affecting utilities, banks & government agencies.

2024-08-13

Grok Faces Prosecution For Misusing AI Training Data

Update: Elon Musk's AI model Grok used posts on X as a training tool without properly obtaining users for permission, breaking GDPR rules.

2024-07-30

The AI Threat: How Can Businesses Protect Themselves?

AI offers exponential opportunities for growth, but organisations equally face increasing risks that should not be ignored. By Sam Peters

2024-07-30

What Sets Next-Generation Firewalls Apart From Traditional Firewalls?

In today's complex cybersecurity landscape, organizations need advanced protection to safeguard their networks & data from sophisticated threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Logsign

Logsign

Logsign is a Security Orchestration, Automation and Response (SOAR) platform with next-gen Security Information and Event Management (SIEM) solution.

TUV Rheinland Group

TUV Rheinland Group

TUV Rheinland Group is a testing services company with nearly 145 years of technological experience. We help you to protect your systems comprehensively, proactively and permanently.

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Spike Reply

Spike Reply

Spike Reply is the company within the Reply Group focusing on cybersecurity and personal data protection.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Chugach Government Solutions (CGS)

Chugach Government Solutions (CGS)

CGS performs work for the Federal Government across 4 unique core lines of business, including: Facilities Management and Maintenance, Construction, Technical IT and Cyber Services, and Educational Se

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.