News

2022-05-26

Intelligent Solutions: How Innovation Is Helping To Suppress Cyber Attacks

Powerful innovations in Quantum, AI, Biometrics and Password Management are helping defend against cyber threats. By Chester Avey

2022-05-25

A Phishing Attack That Delivers Three Forms Of Malware

Trojan Malware: Inserting malicious links into phishing emails allows attackers to harvest usernames, passwords & bank details from Windows users.

2022-05-25

How To Build A Successful Zero Trust Strategy For Data Analytics Users

Watch this webinar to hear why zero trust is one of the proven approaches for cloud access management.

2022-05-25

Satellite Systems Security Needs To Be Reinforced Against Cyber Attack

Cyberspace is the 'soft underbelly' of satellite communications systems and the real vulnerabilities exist on the ground rather than in space.

2022-05-24

Cyber Attacks On Ukraine Step Up The Pressure

Russia's cyber offensive against Ukraine continues with malware attacks and misinformation. Russia's own citizens are also being targeted.

2022-05-24

Vishing Attacks Reach All Time High

Vishing (voice phishing) cases have increased almost 550 percent over the last twelve months with hundreds of thousands of cases detected.

2022-05-24

Clearview Pays £7.5m For Illegally Storing Facial Images

Facial recognition company Clearview AI has been fined £7.5m by the British regulator and told to delete the data of British residents that it holds.

2022-05-23

European Union Agrees New Cyber Security Legislation

NIS 2: The EU has reached agreement on new legislation to impose common cyber security standards on critical EU industry sectors.

2022-05-23

CISA Detect Vulnerabilities In VMWare Products

Random Disconnection: CISA says unpatched VMWare devices should be considered to be compromised and need to be urgently checked.

2022-05-23

Canada Bans China From Its 5G Networks

Canada's telecoms operators are no longer allowed to use Huawei & ZTE gear. Those that have already installed their equipment must remove it. 

2022-05-23

Personal Data Of Two Million Texans Left Exposed For Years

Social Security numbers, addresses, dates of birth, phone numbers and other personal information exposed to anyone who knew how to find it.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

Dualog

Dualog

Dualog provides a maritime digital platform which ensures that services work reliably and securely onboard.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

Netsurit

Netsurit

Managed IT, Cloud, and Security Services. Netsurit is Your IT Innovation and Digital Transformation Accelerator.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

SydeLabs

SydeLabs

At SydeLabs, our mission is to ensure the comprehensive security of your AI systems.

CorePLUS Technologies

CorePLUS Technologies

CorePlus solutions are designed to empower organizations with the tools they need to ensure the utmost protection for their assets, people, and information.

Atumcell

Atumcell

Atumcell’s targeted risk assessment exposes emerging threats before they cause harm.