News

2025-06-05

Police Shut Down A Criminal Malware Operation

EU & US police have taken down AVCheck, a powerful cyber crime system used by hackers to test if security tools could detect their malware.

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-13

Jony Ive Partners With OpenAI To Redefine AI Hardware

Described by OpenAI CEO Sam Altman as the “greatest designer in the world,” Ive takes on a leading role in design and creative direction at OpenAI.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-06-10

Critical Vulnerabilities Disclosed In Versa Concerto

Exploits In The Wild Place Organisations At Risk: An authentication bypass enables attackers to gain admin access & execute commands remotely. 

2025-06-02

British NHS Trusts Hit By Major Cyberattack: Data Stolen  

Healthcare Trusts In London & Southampton Targeted: Patient data may have been compromised due to an Ivanti Mobile Endpoint vulnerability.

2025-05-01

Introducing Modern SecOps, a more realistic alternative to the “autonomous SOC” 

Modern SecOps: Better execution, efficiency, and analyst satisfaction with this new model. By Eoin Hinchy Learn more.

2025-06-11

The Future Of AI Is On-Device

Private By Design: On-Device AI addresses the privacy issues of cloud-based models by putting control in the hands of the user. By Rob Moffat

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

2025-05-01

The Top Seven Skills Security Analysts Need To Succeed, According To Security Leaders

Demand for security analysts is rising rapidly. How can security analysts stand out to hiring managers? Learn more.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Intersec Worldwide

Intersec Worldwide

Intersec Worldwide is a boutique Information Security Firm specializing in PCI Compliance, Assessment, Remediation, Forensics, Data Breach Investigations, Incident Response and IT Managed Services.

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI)

Cyber Forensic & Investigation (CFI) is recognized as Thailand’s leader in cyber investigations and digital forensics.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Cyber Defence Solutions (CDS)

Cyber Defence Solutions (CDS)

Cyber Defence Solutions is a cyber and privacy Consultancy with extensive experience in the development and implementation of cyber and data security solutions to your assets.

Grove Group

Grove Group

Grove provides businesses with the tools that work best for their unique operations, through cybersecurity and cloud services, custom software development and our big data analytics expertise.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Aceiss

Aceiss

Aceiss empowers access security, providing unprecedented visibility and insights into user access.

Marcum Technology

Marcum Technology

Marcum Technology consultants are focused on helping you reach your company’s full potential by exploring creative ways to integrate tomorrow’s technology into your business today.

Gotham Security

Gotham Security

Gotham Security delivers high-quality penetration testing, malicious adversary simulation, compliance program development, and threat intelligence services.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Charm Security

Charm Security

Charm Security is an AI-powered customer security platform that protects organizations and their customers from scams, social engineering, and human-centric fraud.