News

2022-10-10

Hacktivist Group GhostSec Attack Israel

#OpIsrael Update: A hacking group easily breached programmable logic control systems via the Internet, exploiting weak access credentials.

2022-10-12

US Defence Needs New Software at the Centre of its Operations

Cloud adoption, software modernisation, Artificial Intelligence and cyber security are paramount to all US Defense Department missions.

2022-10-05

The Metaverse: A Reality Check

The Metaverse is like a whole new Internet that people are unfamiliar with - a guarantee that both businesses and consumers will be exploited.

2022-10-05

EU Businesses Risk Fines For Not Complying With IoT Security Rules

Companies could face fines of €15 million or 2.5% of turnover if they don’t comply with draft EU legislation addressing the Internet of Things.

2022-10-04

Iranian Hacking Group Deploys Customised Spyware

The Iranian state-sponsored hacking group known as APT42 has been discovered using custom Android malware to spy on targets of interest.

2022-09-28

British Girl’s Suicide Puts Spotlight On Social Media

Anxiety, Depression, Self-harm & Suicide: The death of a 14-year-old girl may prove a turning point in the regulation of social media in Britain.

2022-09-28

Denmark Wins 2022 European Cyber Security Challenge

Defend & Attack Under Pressure: ENISA's annual EU cyber security challenge competition set rival national teams against each other.

2022-10-05

Blockchain Is The New IoT Standard

Blockchain identity standardisation is critical to ensure inter-operability between Internet of Things devices, systems, people and businesses. 

2022-09-28

Pivoting Customers' Mindsets For Cloud Security

When businesses increase cloud capability and cloud velocity, they often create new risk areas outside their familiarity. By JD Sherry

2022-10-05

Modernising SecOps: It’s Time To Unpick The Complex Matrix

Automation Meets The Human Factor: The rapid evolution of technology produces many more signals for cyber analysts to evaluate. By John Davis

2022-10-05

Lessons From The Cyber Front Line

20:20 Hindsight: Some of the highest profile cyber attacks & breaches offer clear pointers on how to avoid similar attacks. By Nigel Thorpe

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

GovCERT.HK

GovCERT.HK

GovCERT.HK is the Government Computer Emergency Response Team for Hong Kong.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

NSIT

NSIT

NSIT SAS is a consulting, advisory and service provider in IT systems. Solution areas include networking & infrastructure, IT management & administration, and cyber security.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

CipherBlade

CipherBlade

CipherBlade specializes in blockchain forensics, data science and transaction tracking.

DigiSec360

DigiSec360

DigiSec360 is a technology firm focused on the human element of cybersecurity.

SIA Group

SIA Group

SIA Group, an Indra company, combines Consulting, Systems Integration and Managed Services in four specialized business areas: Information Security, Storage, IT Management and IT Mobility.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Rimini Street

Rimini Street

Rimini Street is a global provider of enterprise software support products and services, and the leading third-party support provider for Oracle and SAP software products.

AirMDR

AirMDR

Designed by experts, AirMDR solutions cater to the unique demands of security operations centers.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.