News

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

2025-05-01

The Top Seven Skills Security Analysts Need To Succeed, According To Security Leaders

Demand for security analysts is rising rapidly. How can security analysts stand out to hiring managers? Learn more.

2025-05-28

Eight Best Solutions For Managing Compliance In Government Contracting

Make Compliance A Strategic Advantage: Robust platforms & specialized tools are the best solutions for managing compliance in government contracting.

2025-05-27

Cyber Attack On Adidas Highlights A Rising Tide Of Retail Sector Threats

Global sportswear giant Adidas becomes the latest high-profile target in a surge of cyberattacks affecting major retailers worldwide.

2025-06-05

Cyber Threats Escalate Against The Finance Sector

According to a report by cybersecurity firm Cyfirma, the sector remains a prime target for cybercriminals, with attack campaigns peaking in May 2025.

2025-06-03

Enterprises Can Learn From Government Cyber Defence

DNS As A Strategic Asset: Used properly, DNS becomes both shield and sensor; blocking threats and helping to detect them. By Craig Sanderson

2025-05-26

US Confirms Pause In Cyber Operations Against Russia

A Negotiating Tactic: Evident confusion in US government over the extent and duration of a Presidential order to halt offensive cyber operations.

2025-06-05

Japan Enacts Landmark Cyber Defence Legislation

The law empowers Japan’s police and Self-Defense Forces to conduct surveillance & offensive cyber operations to protect critical infrastructure.

2025-05-26

IAM Failures: Lessons From 2025’s Biggest Breaches

The Threat Of Poor IAM: Breaches at M&S, Co-op & Harrods have a common factor - weak Identity Access Management. By Sidra Mobeen

2025-06-04

FBI Warns Of Surging Use Of Vishing

AI-Generated Voice Messages: The FBI has issued a warning about a big increase in malicious scams using fake text & voice messaging.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

IT Band Systems

IT Band Systems

IT Band Systems is an international provider of IT products and services including web server monitoring and web security consulting.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

TechMD

TechMD

TechMD (formerly ICS) is an award-winning IT solutions firm that specializes in cloud solutions, managed cybersecurity services, strategic IT consulting, and managed IT services.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.

Invary

Invary

Invary's expert Runtime Integrity solution, powered by NSA-licensed technology, verifies the security and confidentiality of your system.