News

2025-04-04

President Trump Fires National Security Agency Chief

Trump has fired three National Security Council officials since his inauguration, expressing dissatisfaction with the US security apparatus.

2025-04-04

Beyond MFA: A Multi-Layered Cybersecurity Strategy Is Essential

MFA Is Not Enough: Businesses must adopt a comprehensive and holistic security framework to safeguard their digital assets. By Jon Jarvis

2025-04-02

China Presents The Top Cyber & Military Challenge

No Surprise: China is the top military & cyber threat to the United States, according to a new report by The Office of National US Intelligence.

2025-04-02

BlackLock Hackers Hacked

Experts at Resecurity have penetrated its Data Leak Site and fatally disrupted the prolific Ransomware As A Service cyber crime group.

2025-04-01

Q-Day Could Lead To Hacking Nuclear Weapons

How soon will progress in quantum computing cross a threshold which will allow hacking of all existing online platforms, including nuclear weapons?

2025-04-01

Cracking Down On Cyber Crime In Africa

Operation Red Card: An operation co-ordinated by Interpol has disrupted criminal networks causing major harm to individuals & businesses.

2025-04-01

Elon Musk Has Sold X To His xAI Company

Social Media & AI Intertwined: Combining data, models, distribution and talent - the combination creates greater power & influence for Musk.

2025-03-28

Oracle Cloud Denies It Has Been Breached

Cyber security firms are taking measures to protect customers after claims of a massive attack against Oracle Cloud. Oracle denies any breach.

2025-03-31

Half of Employees Use Shadow AI 

Non-Approved AI Tools: Personal AI tools are so valuable that half of workers would not give them up, even if their organization banned them.

2025-03-28

Staying Ahead Of First-Party Fraud & Abuse

Ecommerce fraud involving consumers exploiting chargebacks & refund policies, is driving a big part of online retail losses. By Xavier Sheikrojan

2025-03-31

Rethinking The Role Of Penetration Testing

Security Check Box Or Key Intelligence Tool? Too many companies treat penetration testing as a static, once-a-year assessment By Rajeev Gupta

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Bird & Bird

Bird & Bird

Bird & Bird is an international law firm with a focus on helping organisations being changed by technology and the digital world. Areas of expertise include cyber security.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Flipside

Flipside

Information Security training provider specialized in personalized training and security awareness campaigns.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

WiSecure Technologies

WiSecure Technologies

WiSecure Technologies aims to develop cryptographic products meeting requirements in the new economic era.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

NCC-CSIRT (Nigerian Communications Commission)

NCC-CSIRT (Nigerian Communications Commission)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

BaXian Group

BaXian Group

BaXian AG is an international consulting company specializing in IT security, data analytics, risk management and compliance.

Endari

Endari

Endari specializes in building cybersecurity maturity within the operational DNA of early-stage startups and SMBs.

Triam Security

Triam Security

Triam Security are on a mission to make software supply chain security effortless, effective, and invisible - so developers can move fast without leaving security behind.