News

2025-04-24

How CISOs Can Speak The Language Of Risk & Resilience 

Boardroom Lingo & Accountability: The most effective CISOs today aren’t just securing infrastructure, they’re securing trust. By Tim Grieveson

2025-04-24

The Leading Israeli Cyber Security Companies [extract]

Israel is a powerhouse in the cyber security domain, with numerous start-ups, established companies, research institutions & government initiatives. 

2025-04-28

Quantum Computing Utility Will Be Achieved Within A Decade

Challenges in technical development, talent acquisition & executive-level understanding remain be overcome to support quantum development.  

2025-04-23

European Military & Government Data Networks Targeted

Russia is using sophisticated phishing methods to attack European governments & military data networks, using Remote Desktop Protocol.

2025-05-07

Chinese Hackers Undertaking A Global Infiltration Campaign 

Update: Chinese attackers have mapped critical infrastructure in preparation for future disruptions across twelve countries and twenty industries.

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-04-23

The FBI Has Lost Track Of Its Hacking Tools

The FBI is secretive about its use of hacking tools, with very little information available about what the tools are, or what they are used for.

2025-04-18

Hackers Claim They Are Selling FortiGate Firewall Access

Zero-Day Vulnerability: The exploit appears to target versions of Fortinet's FortiOS, which was found to be susceptible to authentication bypass flaws.

2025-04-22

Fraud Is Dominating Cyber Insurance Claims

Claims Up by 16%: Financial fraud is one of the most common type of cyber attack leading to an insurance claim, and is certainly the most costly.

2025-04-21

For Sale: Cheap DIY Cyber Crime Kits

Ransomware tools are being sold on the Dark Web for one-time use, allowing inexperienced amateurs to get into cybercrime for as little as $25.

2025-04-17

The Geostrategic Battle Over Semiconductor Chips Just Got Bigger

President Trump is trying to create a domestic US semiconductor industry through protectionism and the US technology sector is getting worried.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Detack

Detack

Detack is an independent supplier of IT security auditing and consulting services.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Norton

Norton

NortonLifeLock is dedicated to helping secure the devices, identities, online privacy, and home and family needs of approximately 50 million consumers.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

WizNucleus

WizNucleus

WizNucleus develops, markets and supports a software platform (Cyberwiz-Pro) that enables Critical Infrastructure enterprises to ensure the future state of their cybersecurity and remain compliant.

Arc4dia Labs

Arc4dia Labs

Arc4dia have developed SNOW, a cyber security solution to combat the world’s most sophisticated cyber threats.

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

ThriveDX

ThriveDX

ThriveDX, the world’s premier EdTech provider (formerly HackerU), champions digital transformation training as a means of empowering individuals to thrive in the age of digital disruption.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Fibernet

Fibernet

Fibernet's innovative solutions in the fields of cybersecurity and fiber optics range from telecommunications infrastructure to small business cybersecurity.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.