News

2025-06-16

Understanding Identity & Access Management

The Front Door Of Cyber Defence: IAM is becoming the essential first line of defence against cyberattacks targeting identities. By Sidra Mobeen

2025-06-02

Scattered Spider Hackers Get Busy

Scattered Spider Targeting Retailers: The cybercrime group linked to multiple high-profile retail breaches increasing its international activities.

2025-06-05

British Research & Innovation Faces Serious Cyber Attacks

Sharp Increase In Cyber Attacks On UKRI: The UK's primary science funding agency is under growing threat from sophisticated cyber espionage.

2025-05-23

New Law Bans Intimate Deepfake Images

The Take It Down Act: New US legislation aims to criminalise the distribution of AI-generated deepfakes and intimate images without consent.

2025-05-22

Major Cyber Attack On British Legal Aid Agency

British Legal Aid Data Hacked: Personal and criminal records have been compromised as sensitive data of thousands of applicants is exposed.

2025-05-22

Tesco Website & App Outage Sparks Customer Frustration

Following the damaging and costly attack on M&S, another major UK retailer faces IT disruptions affecting online shopping & customer loyalty.

2025-06-03

DORA - The Regulatory Awakening

Identity Threat Detection & Response: Identity security can help financial services deal with the challenges of DORA compliance. By Mo Joueid

2025-05-23

Large-Scale Data Exposure Discovered

Infostealer Malware: Research has uncovered a massive breach affecting 184 million records & accounts in a publicly accessed database.

2025-05-21

Pegasus Spyware Maker Fined

For the first time, a developer of spyware has been held responsible for exploiting vulnerabilities in smartphone platforms.

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

IMS Networks

IMS Networks

IMS Networks specializes in the design and management of high criticality networks and telecoms services including network security and Managed Security Services.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Blue Hexagon

Blue Hexagon

Blue Hexagon is a deep learning innovator focused on protecting organizations from cyberthreats.

ARCON

ARCON

ARCON offers a proprietary unified governance framework, which addresses risk across various technology platforms.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.

Spectrotel

Spectrotel

Spectrotel, a trusted provider of Managed Network Solutions, elevates your network with solutions built on cutting-edge technologies.