News

2023-02-13

New Russian Malware Targets Ukraine 

Graphiron: The crisis between Ukraine, NATO & Russia includes aggressive rhetoric, nuclear threats, critical infrastructure sabotage & cyber attacks.

2023-02-10

Specialist Marine Cyber Insurance For Ports & Vessels

Shipping Vulnerable To Cyber Attack: A new partnership to deal with the ever more demanding cyber insurance needs of the maritime sector.

2023-02-21

Insider Threat Management: Keep Up With Growing Threats

Proper insider threat management is essential for reducing the chance of data theft, but nurturing a healthy corporate environment is important too.

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-02-08

SMBs Are Taking Cybersecurity More Seriously

A new report finds that Small & Medium Businesses are actively investing in cyber protection - but there is room for improvement. By Chris Mckie

2023-02-07

Human Error Is A Hacker's Dream

Human Behaviour Is A Vital Piece Of The Puzzle: Phishing, Vishing and MFA Fatigue all have a common characteristic. By Andrew Parsons

2023-02-11

Hackers Hit Thousands of Computers

Ransomware Targeting VMware ESXi Servers: Organisations are warned to take urgent action to protect their unpatched systems.

2023-02-07

Linux Malware Rates Reach Record Highs

Cyber Attack Trends: Until recently, cyber criminals largely ignored Linux compared to other more popular operating systems - not any more.

2023-02-08

Cyber Crime Is The World’s Third Largest Economy

Damage Totaling $8 Trillion Worldwide In 2023: If cybercrime were measured as a country it would be the 3rd largest economy.

2023-02-10

Google Shuts Down Misinformation

Dragonbridge: Google's threat analysis group has terminated thousands of Chinese-linked accounts spreading disinformation across social media.

2023-02-02

FBI Infiltrates Ransomware Group

The FBI infiltrated the notorious Hive ransomware group over seven months to block its attempts to extort funds from over a thousand victims.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Finnish Information Security Cluster (FISC)

Finnish Information Security Cluster (FISC)

FISC is an organization established by major Finnish information security companies to promote their activities nationally and internationally.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Alpine Cyber Solutions

Alpine Cyber Solutions

Alpine Cyber is a Managed IT Service Provider focused on cybersecurity and cloud services.

IP2Location

IP2Location

IP2Location provide services to identify geolocation by IP address, and to detect IP addresses associated with anonymous proxy servers, which are often used for fraud and spamming purposes.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

Intelligent CloudCare

Intelligent CloudCare

Intelligent CloudCare, a division of IPS, is a full IT Services provider serving the needs of SMBs in the metropolitan New York City region.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

Corinium Global Intelligence

Corinium Global Intelligence

At Corinium, we have been bringing together the brightest minds in data, AI and info sec since 2013, to innovate at the intersection of technological advancements and critical thinking.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.