News

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

2024-02-20

Malicious Microsoft Cloud Account Takeover Campaign

Cyber Criminals Follow Businesses Into The Cloud: Basic corporate account credentials are a lucrative potential source of money & further exploits.

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

2024-02-14

Build an Effective Endpoint Detection and Response Strategy

Ready To Simplify Your Endpoint Security? Discover how you can safeguard your AWS environment with tools available in AWS Marketplace.

2024-02-14

Flight App Vulnerability Could Enable Skyjacking

Hackers Could Hijack Flights: In an increasingly technology-focused world, aviation security is becoming a critical problem. 

2024-03-04

Prioritising Data Privacy & Security

The Most Valuable Assets: Every piece of information holds value and must be shielded from prying eyes and malicious intent. By Jacques du Preez

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-13

Outsourcing Production Risks Productivity

An IT department often needs to find a quick solution when a large number of users are impacted by an operational emergency. By Matt Lorentzen

2024-02-13

The US Makes Robocalls Illegal

With major national elections pending in the major democracies around the world, the US FCC regulator has outlawed AI-generated phone calls.

2024-02-13

Chinese Hackers Operated Undetected In Critical US Networks

The Chinese state-sponsored hacking group Volt Typhoon has been embedded in critical US infrastructure networks for at least five years.

2024-02-13

DDoS Attacks In Poland Have Spiked As New Government Takes Office

Damaging Hacktivist Activity: Politically motivated DDoS attacks on public services across several critical sectors have spiked following elections.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

AtkinsRéalis

AtkinsRéalis

AtkinsRealis is a market-leading design, engineering and project management consultancy operating in fields ranging from infrastructure, through energy and transport to cybersecurity.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

KOBIL

KOBIL

KOBIL is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

Excelerate Systems

Excelerate Systems

Excelerate Systems is a leading provider of IT services with a focus on Big Data, Cloud Services and Security.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

AaDya

AaDya

AaDya provide smart, simple, affordable and effective cybersecurity software solutions for small and medium businesses.

Strike Graph

Strike Graph

The Strike Graph GRC platform enables Security Audits & Certifications.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

QGroup

QGroup

QGroup has been re-designing the consultancy industry since 2012. We're a rapidly expanding group of consulting companies that deliver bespoke IT services including cybersecurity.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Syntura

Syntura

Syntura is your trusted partner for advisory, infrastructure and managed services.