News

2022-04-05

Multimillion-Dollar Business Email Fraud Gang Arrested

Operation Eagle Sweep targeted fraudsters responsible for stealing from five hundred US victims and causing losses totaling $51 million. 

2022-04-05

Cyber Security Lessons From The Ukraine War

Network Security Is Vital: The war in Ukraine serves as a clear example of how cyber warfare will play a major role in future conflicts. 

2022-04-06

The Pentagon Gets $250m Extra To Spend On AI

The Pentagon’s AI and Data Acceleration Initiative is intended to speed up the adoption of ArtificiaI Intelligence across US Combat Commands.

2022-04-08

The British Online Harms Bill Takes Shape

There will be new rules for social media and the regulator Ofcom will have powers to fine firms or block access to sites that fail to comply.

2022-04-12

Anonymous Hackers Aim To Undermine Russia

Anonymous has declared a cyber war on Russia and is busy with a bombardment of cyber attacks in retaliation for the invasion of Ukraine.

2022-04-05

Zelensky Deepfake Tells Ukrainians To ‘lay down arms’

Don't Be Fooled: The deepfake purports to show President Zelensky declaring that Ukraine has “decided to return Donbas” to Russia.

2022-04-19

Beware Crypto Donation Requests For Ukraine

Fraud Warning: Cyber criminals have been detected soliciting donations using fake messages to exploit the Ukraine conflict with Russia.

2022-04-12

Deep-Fake Information Warfare

Machine Learning and AI will vastly imrove the ability to reach a mass audience with plausible content, making malicious actors even more powerful.

2022-04-08

Technology’s Impact On Cyber Security

Detection of cyber crime is struggling to keep pace with technology and the world is growing more vulnerable to cyber crime, identity & data theft.

2022-04-08

Hackers Breach Multifactor Authentication

State-sponsored Russian hackers breached an NGO by leveraging multifactor authentication defaults to exploit a Windows Print Spooler vulnerability.

2022-03-26

Protecting Your Business From A Supply Chain Attack

Understanding how criminals operate makes it possible to protect your organization’s supply chain from cyber attacks. By Craig Moores

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Bayshore Networks

Bayshore Networks

Bayshore Networks was founded to safely and securely protect Industrial IoT (IIoT) networks, applications, machines and workers from cyber threats.

Datacom Systems

Datacom Systems

Datacom Systems is a leading manufacturer of network visibility solutions.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

Central Intelligence Agency (CIA) - USA

Central Intelligence Agency (CIA) - USA

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Gomboc.ai

Gomboc.ai

Gomboc solve cloud infrastructure security policy deviations by providing tailored remediations to the IaC (Infrastructure as Code).

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

BluTinuity

BluTinuity

BluTinuity is a premier management consulting firm with a passion for information security, business continuity, incident response, disaster recovery, and HIPAA security.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.

Acuvity

Acuvity

Acuvity is the most comprehensive AI security and governance platform for your employees and applications. Secure your GenAI adoption with confidence.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.

Esentry

Esentry

Esentry systems is a managed security service provider with focus on continuous security monitoring, threat detection, threat analysis and cybersecurity compliance.