News

2025-02-12

NATO Technology Partner Expands UK Operation

Goldilock: British manufacturing business grows fast to supply demand for its network isolation technology, used to secure critical infrastructure.

2025-02-12

Indian Banks Aim To Reduce Online Fraud

Additional Factor Authentication: A Central Bank initiative to improve the security of cross-border & online payments where a card is not present.

2025-02-12

LinkedIn Is A Focal Point For Cyber Crime

LinkedIn may be a vital tool for job seekers and professionals, but it has also become an open target for cyber criminals exploiting its credibility. 

2025-02-12

AI Love You This Valentine's Day

Fauxmance: With AI, Deepfake and Romance Fraud booming, new McAfee research reveals one in two believe AI chatbots could steal their heart.

2025-02-11

AI-Based Phishing Attacks Demand A Multi-Pronged Response

New Techniques Demand A Zero Trust Mindset: A new strategy for combating AI-powered phishing attacks is needed. By Oliver Paterson

2025-02-11

DeepSeek Exposes Sensitive Data

Major Security Issues: DeepSeek sends sensitive data over the Internet without encryption, exposing it to interception & manipulative attacks.

2025-02-10

Apple Ordered To Give Access To Users' Encrypted Data

Investigatory Powers: British law enforcement have demanded access to encrypted data stored by Apple users in its global cloud service.

2025-04-24

The Leading Israeli Cyber Security Companies 

Israel is a powerhouse in the cyber security domain, with numerous start-ups, established companies, research institutions & government initiatives. 

2025-02-07

Combating Cyber Threats In The Age Of AI 

AI-powered tools are driving the many ways that cybercriminals deceive businesses into exposing their most sensitive information. By Phil Calvin

2025-02-07

Managing Dark Web Exposure In 2025

Navigating The Shadowy Frontiers: The dark web’s trade in stolen data presents several big challenges for organisations. By Vishaal Hariprasad

2025-02-12

British Cyber Code Of Practice For Developing AI

The code applies to developers, system operators, and data custodians at organisations that create, deploy, or manage AI systems.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

King & Spalding

King & Spalding

King & Spalding is an international law firm with offices in the United States, Europe and the Middle East. Practice areas include Data, Privacy & Security.

CERT-EU

CERT-EU

CERT-EU is a permanent Computer Emergency Response Team for the EU institutions, agencies and bodies.

StickyMinds

StickyMinds

StickyMinds is the web's first interactive testing community exclusively engaged in improving software quality throughout the software development lifecycle.

SecurePay

SecurePay

SecurePay is Australia's premier payment gateway, with a range of secure online payment solutions for online retailers, SMEs and enterprise businesses.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

r00tz Asylum

r00tz Asylum

r00tz Asylum is a nonprofit dedicated to teaching kids around the world how to love being white-hat hackers.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Binarly

Binarly

Binarly is a global firmware and software supply chain security company founded in 2021.

Software Improvement Group (SIG)

Software Improvement Group (SIG)

Software Improvement Group helps business and technology leaders drive their organizational objectives by fundamentally improving the health and security of their software applications.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Blaze Networks

Blaze Networks

Blaze are a security-focused Managed Services Provider delivering communications and IT services to businesses across the UK.