News

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-29

How Ransomware's Industrialization Impacts SOC Operational Tempo

The latest evolution of the ransomware industry is prompting security teams to adopt more modern tools & more agile workflows. By Matt Muller

2025-05-21

The Impact Of The Internet On Modern Society [extract]

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-20

Insurers Are Now Covering AI Malfunction Losses

The intersection of AI and insurance is evolving fast, offering efficiencies, but also demanding the careful management of risks & liabilities.

2025-05-16

Iran Suffers A Large Scale Attack On Critical Infrastructure

A mystery attack appears to have targeted Iran’s controversial nuclear program to enrich uranium and enable nuclear weapon development.

2025-05-20

The Impact Of The Internet On Modern Society

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-15

Police Investigate Fake Council Tax Fraud

Cyber criminals have used a fake web address to divert payment of propery tax bills sent to 300,000 householders in Northern Ireland.

2025-05-20

Security Performance Metrics Fall Short

Align Security Metrics With Your Business Goals: As research reveals flaws in security performance, here are 4 ways to shift your team’s focus.

2025-05-20

Dior’s Client Data Has Been Breached

Contact Information, Purchases Data & Preferences Stolen: Luxury French fashion brand Dior is the latest retail company to be attacked.

2025-05-19

Kill Switches Secretly Installed In Solar Panels

Remotely Deactivated Power Inverters: Chinese made “kill switches” have been discovered hidden in solar panel controls, are an urgent warning.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Cypress Semiconductor

Cypress Semiconductor

Cypress is a semiconductor design and manufacturing company providing embedded devices for secure IoT applications.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Valire Software

Valire Software

Valire provide a solution for the automated detection of internal fraud.

Yelbridges

Yelbridges

Yelbridges offer high quality IT security & risk management services to mitigate business risks.

ST Engineering

ST Engineering

ST Engineering is a leading provider of trusted and innovative cybersecurity solutions.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

doIT Solutions

doIT Solutions

doIT solutions specialize in IT security and infrastructure, security automation, data center, and cybersecurity.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

Babble

Babble

Babble is a Unified Comms, Contact Centre and Cyber Solutions provider. We believe in making next-generation technology simple to use, deploy and manage.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

ProvenRun

ProvenRun

ProvenRun is a leading provider of trusted software solutions with extensive expertise and an unwavering commitment to security.

InfoTrust

InfoTrust

InfoTrust is a leading specialised cybersecurity practice that combines a customer-first consulting approach with next-generation security solutions.

Solid8 Technologies

Solid8 Technologies

Solid8 Technologies is a value added distributor and innovation incubator partnering with leading global Cyber Security software Vendors.