News

2025-04-09

On Trend With Zero-Trust Architecture & Multi-Cloud Environments

Security management is shifting, with changes in cloud platform adoption, deployment of firewalls and Software-Defined Wide Area Networks.

2025-04-07

Britain Is Unprepared To Defend Itself From Nation-State Hackers

The rising sophistication of cyber attacks and state-backed incidents has exposed many vulnerabilities within UK public sector organisations.

2025-04-09

Britain Falls Under Pressure To Relax Regulations On AI

The British government is warned to relax copyright laws and to allow Artificial Intelligence firms build new products in a less restricted way.

2025-04-09

CYRIN's New Lab - The Fundamentals of Cryptography

A New CYRIN Lab: Students are introduced to cryptography, the process of hiding or encoding messages so only intended recipients can read them.

2025-04-04

Staying Secure, Skilled & Sustainable

The IT Balancing Act: Three key areas are shaping the IT industry - Cybersecurity, AI & Cloud adoption, and Sustainability. By Martin Hodgson

2025-04-08

Rethinking Cyber Defence For Tomorrow's Threats

Restricting access through identity management & authorisation can help organisations face cybersecurity challenges. By Spencer Young

2025-04-04

Vishing - The Voice Scam You Need To Know About

Dramatic Escalation In Vishing Attacks: Fighting cybercrime isn’t just about having the right tech - it’s also about being aware and cautious.

2025-04-07

DDoS Trends & Predictions For 2025

The aim is to paralyze the target’s operations - which is why DDoS protection measures are critical to an organization's cybersecurity strategy.

2025-04-07

The Security Risks Behind Shadow ML Adoption 

Defending AI: As AI models become more advanced and widely deployed, security concerns continue to mount. By Shachar Menashe

2025-04-07

Trump Gives TikTok Another 75 Days Extension

Buyers of the contentious social media platform's US business have more time to negotiate, after Trump's global tariffs torpedoed a deal.

2025-04-05

Oracle Cloud Now Admits To Having Been Hacked

Update: Oracle Cloud has confirmed that it was breached in an attack which affected an obsolescent platform still being used in healthcare.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Wavestone

Wavestone

Wavestone is a strategy and technology consulting company with areas of expertise including digital transformation and cybersecurity.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

ISMAC

ISMAC

ISMAC was founded to create a security solution that would work for smaller to medium as well as bigger corporations at an affordable price.

Wisetek

Wisetek

Wisetek is a global provider of end-to-end IT Asset Disposition (ITAD), reuse and secure data destruction management services to the world’s leading IT Corporations, data centres and manufacturers.

IntegraONE

IntegraONE

IntegraONE is a IT solutions provider offering a full range of networking and technology solutions.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.

Planisys

Planisys

Planisys is a cybersecurity leader specializing in cutting-edge DNS security and email security solutions.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.