News

2025-06-17

NATO Allies Expose Russian Cyber Campaign Targeting Ukrainian Supporters

Fancy Bear Unveiled: Russia’s secret military hackers are presenting a serious risk to those involved in the delivery of assistance to Ukraine.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-06-17

How To Spot Phishing, Vishing & Smishing

Be alert to tactics that exploit personal information to craft convincing fraudulent communications & extract sensitive data. By John Mc Loughlin

2025-06-02

Cybersecurity Summer Reading List

What’s Happening In The World Of Cybersecurity? Here are some books, blogs, articles & podcasts you might check out in your downtime

2025-06-10

Critical Vulnerabilities Disclosed In Versa Concerto

Exploits In The Wild Place Organisations At Risk: An authentication bypass enables attackers to gain admin access & execute commands remotely. 

2025-06-02

British NHS Trusts Hit By Major Cyberattack: Data Stolen  

Healthcare Trusts In London & Southampton Targeted: Patient data may have been compromised due to an Ivanti Mobile Endpoint vulnerability.

2025-05-01

Introducing Modern SecOps, a more realistic alternative to the “autonomous SOC” 

Modern SecOps: Better execution, efficiency, and analyst satisfaction with this new model. By Eoin Hinchy Learn more.

2025-06-11

The Future Of AI Is On-Device

Private By Design: On-Device AI addresses the privacy issues of cloud-based models by putting control in the hands of the user. By Rob Moffat

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

2025-05-01

The Top Seven Skills Security Analysts Need To Succeed, According To Security Leaders

Demand for security analysts is rising rapidly. How can security analysts stand out to hiring managers? Learn more.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Libraesva

Libraesva

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Propelo

Propelo

Propelo (formerly LevelOps) is an engineering excellence platform that helps increase developer productivity and improve security with data-led insights and workflow automation.

Obrela Security Industries

Obrela Security Industries

Obrela provides security analytics and risk management services to identify, analyze, predict and prevent highly sophisticated security threats in real time.

Globesecure Technologies

Globesecure Technologies

Globesecure Technologies is a networks and cyber security company. We are here to resolve business security challenges and secure the digital transformation journey of our clients.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

NPCERT

NPCERT

NPCERT is a team of Information Security experts formed to address the urgent need for the protection of national information and growing cybersecurity threat in Nepal.

Astran

Astran

At Astran, we revolutionize data security by introducing a groundbreaking solution for data confidentiality headaches.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Scalarr

Scalarr

Scalarr is an innovative, next-generation cyber security firm focused on automation and AI to detect and prevent threats in mobile and Edge/IoT infrastructures.

Right Hand Technology Group (RHTG)

Right Hand Technology Group (RHTG)

Right Hand Technology Group is a premier provider of IT services specializing in cybersecurity, managed IT solutions, and compliance.