News

2023-11-20

Bridging The Gap Between Cybersecurity & Business Goals

The Evolving Role Of The CISO: The modern CISO has pivotal responsibilities across the oprganisation & faces formidable challenges. By Brandon Rochat

2023-11-20

Best Practices For Securing Enterprise IoT Devices

Most users leave their credentials on IoT devices, which exposes them to attackers. These are the best practices for securing their cybersecurity.

2023-11-17

CEO Of OpenAI Is Dismissed

Sam Altman is fired from OpenAI as the Board loses confidence in his leadership saying he was not "consistently candid with his communications".

2023-11-17

How To Conduct A HIPAA Risk Assessment

Navigating HIPAA: The US Health Insurance Portability & Accountability Act provides a vital shield for sensitive patient data. By Narendra Sahoo

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-17

Mid-market Organisations At Greater Risk

As large organisations grow more resilient, smaller mid-sized organisations must prioritise attack disruption as cyber-threats evolve. By Tim Anderson

2023-11-18

Surging Attacks On Israeli Websites

In parallel with continuing rocket attacks on Israel as it troops pursue Hamas in Gaza, hacktivist groups are delivering an offensive cyber campaign.

2023-11-18

Mitigating The Security Risks Of Black Friday 

Online data transfers significantly rise during Black Friday as consumers search for bargains, providing rich opportunities for cybercriminals.

2023-11-14

Australian Ports Recovering After Large-Scale Attack 

A cyber security incident shut down one of Australia's largest multiport port operators, affecting maritime freight in and out of the country.

2023-11-14

BEC Attacks: Trends & Predictions For 2024

BEC attacks pose a significant threat to businesses, but with the right defensive measures businesses can effectively mitigate these attacks.

2023-11-14

The Cyber Skills Gap Is Still Not Getting Better

Despite growing to 5.5 million professionals worldwide, the industry still needs millions of qualified workers to defend against digital threats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

MailXaminer

MailXaminer

MailXaminer is an advance and powerful email investigation platform that scans digital data, performs analysis, reports on findings and preserves them in a court validated format.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

Cequence Security

Cequence Security

Cequence, a pioneer in API security and bot management, is the only solution that delivers Unified API Protection (UAP), uniting discovery, compliance, and protection.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

NACVIEW

NACVIEW

NACVIEW is a Network Access Control solution. It allows to control endpoints and identities that try to access the network - wired and wireless, including VPN connections.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

ModelOp

ModelOp

ModelOp is the leading AI Governance software for enterprises and helps safeguard all AI initiatives.