News

2025-03-28

Oracle Cloud Denies It Has Been Breached

Cyber security firms are taking measures to protect customers after claims of a massive attack against Oracle Cloud. Oracle denies any breach.

2025-03-31

Half of Employees Use Shadow AI 

Non-Approved AI Tools: Personal AI tools are so valuable that half of workers would not give them up, even if their organization banned them.

2025-03-28

Staying Ahead Of First-Party Fraud & Abuse

Ecommerce fraud involving consumers exploiting chargebacks & refund policies, is driving a big part of online retail losses. By Xavier Sheikrojan

2025-03-31

Rethinking The Role Of Penetration Testing

Security Check Box Or Key Intelligence Tool? Too many companies treat penetration testing as a static, once-a-year assessment By Rajeev Gupta

2025-03-31

Why The Future Of Banking Hinges On Harnessing Gen Z Talent

Gen Z is the first generation of digital natives, entering workplaces as natural change agents. They could hold the key to transforming banking.

2025-03-30

Britain's Armed Forces Fast-Track New Digital Recruits

As risk levels rise, fast-tracked recruits are entering a rapidly evolving sector, while the IT landscape becomes more challenging. By Richard Giblin

2025-03-25

Creating A Safe & Healthy Workplace: 10 Essential Security Measures

Promoting a safe & healthy workplace isn’t just a response to current challenges; it’s an important aspect of risk management.

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-03-25

Manus - A Fully Autonomous Artificial Intelligence

Far-Reaching Implications: Manus operates autonomously, can multi-task seamlessly and complete jobs without instructions or human interaction.

2025-03-26

The Leading Russian Cyber Security Companies

Russian is strengthening its national cyber defences by requiring commercial organisations to connect to a unified cyber security system.

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Scince & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Viasat

Viasat

Viasat is a provider of high-speed satellite broadband services and secure networking systems covering military and commercial markets.

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

Centro de Gestion de Incidentes Informaticos (CGII) - Bolivia

CGII is the Computer Incident Management Center of the State of Bolivia.

ToucanX

ToucanX

ToucanX has eliminated remote attack vectors without sacrificing productivity. We’ve brought embedded near real time virtualization to the enterprise endpoint.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Accurics

Accurics

Accurics enables self-healing cloud native infrastructure by codifying security throughout your development lifecycle.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

ExchangeDefender

ExchangeDefender

ExchangeDefender provides cybersecurity services that secures your company email and data, and guarantees 24/7 email access.

Diversified Search Group - Alta Associates

Diversified Search Group - Alta Associates

Diversified Search Group is an industry leader in recruiting diverse, inclusive and transformational leadership for clients.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.