News

2023-02-27

Half Of British SMEs Have Been Attacked

Cyber criminals have identified SMEs as vulnerable because of new working practices, small IT teams and a lack of solutions knowledge. 

2023-02-23

Scandinavian Airline App Compromised

Don't Use The SAS App: Users risk being logged into the wrong account and having access to the personal details of other people.

2023-02-25

Digital Platform Regulation - Impossible?

Governing The Ungovernable: Digital platforms are the last fortress for democratic and participatory civic engagement. By Yasmin Afina

2023-02-23

Cyber Security Strategies Need To Evolve Alongside The Enterprise

Hybrid Work: Security is no longer about protecting one specific network for the company - it's about protecting remote work too. By Mark Guntrip

2023-02-23

Cybersecurity & The New Space Race

Houston, We Have a Problem: Cyber security on spacecraft might require AI & other kinds of Machine Learning to build the necessary resilience.

2023-02-22

European & American Hackers Attack China

Hacked: Chinese experts say that sensitive information, source code and databases of critical Chinese information systems have been exposed.

2023-02-22

Twitter Wants Users To Pay For 2FA

Paying For Social Media: Non-Twitter Blue users will have to find alternative ways to secure their accounts within 30 days of receiving notice.

2023-02-21

Universities Targeted With Ransomware

Attacks On The Education Sector Up 51% In 2022: Two leading technical universities in Ireland and Israel have been struck by ransomware.

2023-02-20

Is Your Business Compliant With Data Sovereignty Requirements?

It is increasingly important for organisations to understand where their cloud data is stored and who holds the keys to that data. By Florian Malecki

2023-02-16

Illegal Crypto Transactions Reach A New Peak

There were more than $20 billion worth of illegal transactions using crypto currency in 2022, an increase of 11% from the $18bn in 2021.

2023-02-20

Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment 

Despite increased attacks criminals have experienced a 40% drop in their earnings, as more victims are refusing to pay the ransom demanded.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

TrustInSoft

TrustInSoft

TrustInSoft develops solutions that validate mission-critical software and eliminate attack vectors.

NanoLock Security

NanoLock Security

NanoLock delivers the industry’s only end-to-end platform for the IoT and connected devices ecosystem.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Octo

Octo

Octo, an IBM company, is a technology firm dedicated to solving the Federal Government’s most complex challenges, enabling agencies to jump the technology curve.

Networks Unlimited

Networks Unlimited

Networks Unlimited is a leading value-added distributor in Africa, providing technology solutions with a focus on security, networking, enterprise systems management and cloud technologies.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Hackurity.io

Hackurity.io

Hackurity.io is a high energy IT security start-up founded in 2021 out of the frustration that IT Security is highly fragmented and reactive.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.