News

2024-01-30

Britain's New Digital Markets Act Could Cost Business Billions

The updated Digital Markets Bill, intended to ensure fairer competition in the technology industry, may impose heavy costs on business & consumers.

2024-01-30

What Lessons Have We Learnt From Recent Ransomware Group Attacks?

No Room For Laxity: Whilst regulatory fines are computable, reputational loss and its longevity are impossible to quantify. By Jack Garnsey

2024-01-30

Deep Fake Images of Taylor Swift Taken Down

Explicit AI-generated images of Taylor Swift have been removed from X / Twitter in the latest example of the proliferation of fake pornography.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

2024-01-29

Under-Performing Cyber Security Providers

The Financial Services Industry Has A Problem: Many organisations that outsource their cybersecurity lack confidence in the service provider.

2024-01-29

Cyber Security Education From Childhood Is Becoming Vital

Over 70% of children around the world have experienced at least one type of cyber threat online. They need education to protect themselves.

2024-01-27

To Increase Your Pay You Should Acquire AI Skills

Career Opportunities: Employers are willing to pay a 31% premium for IT workers with AI expertise and often they are offering six-figure salaries.

2024-01-27

Major Data Breach Affects Twitter, LinkedIn & Weibo

Personal data of millions of users at risk after cyber security experts uncovered what some are describing as the biggest data breach of all time.

2024-01-26

The Power Of Unified Cloud Protection

Security Service Edge: A modern approach to business security to improve network performance & protection. By John McLoughlin

2024-01-18

Anonymous Sudan Attack London Internet Facility

Unverified DDoS Atack: Russian affiliated hackers claim they have attacked London's Internet Exchange in response to airstrikes in Yemen.

2024-01-24

Ransom Attackers Impersonate Security Researchers

A New Ransom Exploit: Threat actors pretend to help hacked victims by offering to hack the original ransomware gang and delete the stolen data. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Varonis

Varonis

Varonis provide a security software platform to let organizations track, visualize, analyze and protect their unstructured data.

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Perception Point

Perception Point

Perception Point is a Prevention-as-a-Service company, built to enable digital transformation. Our platform offers 360-degree protection against any type of content-based attack.

CyberForce Program - US Department of Energy

CyberForce Program - US Department of Energy

The Department of Energy’s (DOE) CyberForce Program is a workforce development program that seeks to inspire and develop the next generation of cyber defenders for the energy sector.

Abion

Abion

At Abion (formerly BRANDIT), we empower your business by providing comprehensive brand protection and web security services.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.

Quantum Squint

Quantum Squint

Quantum Squint is a cutting-edge cybersecurity company specializing in the use of advanced regression management techniques to detect, analyze, and prevent vulnerabilities in digital systems.

Bridgenet Solutions

Bridgenet Solutions

Bridgenet specialises as a top-notch Information and Technology Solutions Provider for businesses.

United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office of Counter-Terrorism (UNOCT)

UNOCT provides UN Member States with the necessary policy support of the UN Global Counter-Terrorism Strategy, and wherever necessary, expedites delivery of technical assistance.

Greenway Solutions

Greenway Solutions

Greenway Solutions are trusted advisors relied upon by our clients to combat sophisticated adversaries in the fraud and security domain.