News

2024-06-14

Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

An average cybersecurity stack comprises 32 solutions, highlighting the need for consolidated platforms to deal with growing complexity.

2024-06-13

AI-Generated Misinformation - A Growing Concern For 2024 Elections

Cybersecurity & Trust: Concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election.

2024-06-13

Protecting Data In The Remote Working Era

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-12

Cyber Criminals Do Not Care Who Falls Victim

Attacks on Santander and NHS London demonstrate why cyber insurance should be part of every business' resilience strategy. By Marc Rocker

2024-06-10

Britain's Cybersecurity Business Is Booming

British Cyber Security Sectoral Analysis: The successful growth of the domestic cybersecurity industry is having a nationwide impact.

2024-06-12

Kinsing Malware Attacks Analysed

A Critical Threat: Kinsing targets cloud infrastructure, exploiting misconfigurations to rapidly spread attacks across numerous popular applications.

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-07

OpenTofu's New State File Encryption Is A Boon For IaC Security

Open-source Infrastructure as Code Tool: OpenTofu's new state file encryption feature is a significant milestone for IaC security.

2024-06-11

Business Email Compromise Warning Signs

Don't Fall For The Trap: Understanding common social engineering tactics and the threat groups behind them. By John McLoughlin

2024-06-20

London Hospitals Held To Ransom

Update - £50million Ransom: Qilin cyber crime group has demanded payment from the affected London Hospitals unable to access critical services.

2024-06-10

The Major AI Threats Cyber Security Teams Must Deal With

The Big Five: Cyber threats are shaping the future, with a focus on the increasingly sophisticated use of AI by attackers as well as defenders.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Telspace Africa

Telspace Africa

Telspace Africa provide the highest level of IT security solutions including advisory, penetration testing, vulnerability assessments, red teaming, social engineering and training.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

XignSYS

XignSYS

XignSys develops innovative password-free and user-friendly Authentication solutions and electronic signature systems for B2B and B2C applications.

SafeLogic

SafeLogic

SafeLogic provides strong encryption products for solutions in mobile, server, Cloud, appliance, wearable, and IoT environments that are pursuing compliance to strict regulatory requirements.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Root9B (R9B)

Root9B (R9B)

R9B offers advanced cybersecurity products, services, and training to enhance the way organizations protect their networks.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.