News

2023-07-24

The Security Challenge: Mapping & Securing Your Distributed Data

Why mapping your distributed data is necessary, what challenges you’ll face along the way, and how you can overcome them. By Dotan Nahum

2023-07-25

The Impact of Artificial Intelligence On Knowledge Workers

The impact of Artificial Intelligence on jobs is still an abstract concept for most workers - something on the distant horizon. That's changing fast.

2023-07-24

Cyber War, Intelligence, Malware & Espionage

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2023-07-26

British Employees Lack The Training To Use AI Tools

Research from Salesforce shows that skills shortages at organisations across the UK pose serious challenges for the uptake of AI tools. 

2023-07-20

Sweden Issues An Order 'Stop Using Google Analytics'

Four Companies Fined; Customers' personal data was supplied to Google Analytics in a way that failed to meet EU technical security standards.

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-18

A Million British Medical Patient Records Hacked

Details potentially exposed include name & contact details, next of kin information, ID numbers, study details, ethnicity, and even disability codes.

2023-07-19

British Spy Agency Was Hacked 20 Years Ago

Two decades have passed since malware designed to evade detection & steal sensitive data was first detected on a British government device.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

2023-07-11

Twitter Threatens To Sue Meta Over Threads App

The Friendly Alternative: Twitter is threatening legal action against Meta accusing it of poaching former employees to create a “copycat”.

2023-07-14

A “Whole-of-Society" Approach To Cyber Crime

Active Cyber Defence: Britain's NCSC was notified of a suspicious email or website every five seconds in 2022 - that's 7.1m suspicious incidents.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

Insta Group

Insta Group

Insta are a trusted cyber security partner for security-critical companies and organizations.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

KeyXentic

KeyXentic

KeyXentic Inc. is a professional mobile and data security service provider. We are devoted to design convenient and strong security for user’s data protection and privacy without any compromise.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

CliftonLarsonAllen (CLA)

CliftonLarsonAllen (CLA)

CLA exists to create opportunities for our clients through industry-focused advisory, outsourcing, audit, tax, and consulting services.

Istari

Istari

ISTARI is a new kind of cyber risk management company. We’re an agile collective of best-in-class capabilities and experts, who build ongoing partnerships with clients.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

UrbanFox

UrbanFox

UrbanFox’ powerful AI provides a simple and intuitive way to reduce fraud risk, whilst isolating potential fraudsters that cost your business money.