News

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

2023-11-06

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

Join this webinar to hear security experts from SANS and AWS share what a next-generation firewall is and how it redefines the concept of a firewall.

2023-11-06

Phishing Is The Hackers' Favourite Tool

Phishing is often the first stage of a larger attack, leading to data breaches, malware, ransom, identity theft & other serious consequences. 

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-12-30

2023 - A Significant Year For Cyber Incidents

2023 was a year of serious, damaging cyber threats and attacks. Criminals were relentless in their methods, becoming faster & more sophisticated.

2023-11-06

Quantum Computing - Its Background & Future

Quantum computing uses quantum theory which explains the behaviour of energy and material on the atomic and subatomic levels. So What?

2023-11-15

The Dark Web Encompasses Both Criminal & Legal Activities

The term Dark Web sounds ominous and it is that part of the Internet comprising websites you can't access through the usual web browsers.

2023-11-30

Cyber Security Trends For 2024

Cybercrime is predicted to cost the global economy $8 trillion USD in 2023. By the end of 2024 the anticipated cost will be $10.5 trillion.

2023-11-02

President Biden Takes Action On Artificial Intelligence

US President Joe Biden has announced a new Executive Order that aims to regulate the development of “safe, secure and trustworthy” AI. 

2023-11-02

Half Of Cyber Attacks On British Organisations Succeed

SecOps Teams Are Too Busy To Mitigate: Of cyber attacks experienced by UK organisations in the in the last two years, 48% were successful. 

2023-11-01

The Criminal Use Of AI Is Increasing 

A Whole New Level Of Threat: The dynamic nature of AI-driven attacks can render established static & legacy defense techniques ineffective. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Secudos

Secudos

SECUDOS is an innovative appliance technology and services provider focused on IT security and compliance.

_cyel

_cyel

_cyel is introducing a new cybersecurity strategy: not a new generation of patches and firewalls, but moving target security – we take away the targets. Without replacing your existing system.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

IP Twins

IP Twins

IP Twins offer a wide range of services related to domain names and online brand protection.

Argentra

Argentra

Argentra is a specialist engineering company, we have years of experience developing custom security software and providing security risk consulting.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Closed Door Security

Closed Door Security

Closed Door Security is the only cybersecurity team in the north of Scotland offering everything from IASME Certification to CREST-Accredited penetration testing.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.