News

2024-05-13

Notorious Cyber Criminal Sentenced

Ransom_Man: A notorious hacker has been jailed for blackmailing 33,000 psychotherapy patients after stealing their personal medical notes.

2024-05-08

Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

A Silent Invisible War: Israel has been developing its defences against cyber attacks, to function like the Iron Dome against missile attacks.

2024-05-13

Russia’s Malicious Cyber Activity Condemned

Britain has joined with the EU, Germany and Czechia in condemnation of burgeoning malicious cyber activity by Russian spy & intelligence agencies.

2024-05-07

Neutralizing Cyber Threats In SaaS Applications

Any business using SaaS applications opens itself to numerous security risks. Here are the best practices to prevent costly breaches. By Matt Verlaque

2024-05-08

Microsoft Reforms ‘Weak’ Cyber Security Strategy

Do Security: Microsoft's reputation for security is suffering after criticism of the company’s weak cyber practices and lax corporate culture.

2024-05-20

Cyber Tensions & Capabilities In Asia

Governments across the Asia-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity.

2024-05-19

Ukraine Has An AI-Generated Government Spokesperson

Digital Diplomat: Ukraine has an AI-generated spokesperson called Victoria Shi who will make official statements on behalf of its Foreign Ministry.

2024-05-08

New AWS Webinar: Harnessing The Power Of SIEM

On Demand: In this AWS and SANS webinar, experts will help you understand how to most effectively use Security Information & Event Management.

2024-05-17

The Ransomware Threat Landscape Is Diversifying

Ransomware & Digital Extortion: The frequency of attacks is going up, partly driven by smaller new threat groups becoming more active.

2024-05-16

The Global Corporate Digital Security Landscape

Suspicious Internal Activity: Attackers persistently seek to infiltrate organisations by abusing the trust inherent in vendor-client connections.

2024-05-07

The US Has A New Global Cyber Security Strategy

After years of escalating threats from China, Russia and cyber criminals, the US wants to build up international cyber security cooperation.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Coalfire

Coalfire

Coalfire specialises in cyber risk management and compliance. Our services span the cybersecurity lifecycle from advisory and compliance, to testing and engineering, monitoring and optimization.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

TypingDNA

TypingDNA

TypingDNA uses AI to recognise people by the way they type on desktop keyboards and mobile devices.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

KrCERT/CC

KrCERT/CC

KrCERT/CC is the National Computer Emergency Response Team in Korea.

Auriga Consulting

Auriga Consulting

Auriga is a center of excellence in Cyber Security, Assurance and Monitoring Services, with a renowned track record of succeeding where others have failed.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

CoinCover

CoinCover

Blockchain technology is changing everything. However, it brings its own set of unique risks. Coincover ensures everyone is protected, enabling them to innovate freely, without constraints.

Servadus

Servadus

Servadus help organizations with their cybersecurity and compliance programs through management and sustainability, consulting, and assessing.