News

2025-03-31

Why The Future Of Banking Hinges On Harnessing Gen Z Talent

Gen Z is the first generation of digital natives, entering workplaces as natural change agents. They could hold the key to transforming banking.

2025-03-30

Britain's Armed Forces Fast-Track New Digital Recruits

As risk levels rise, fast-tracked recruits are entering a rapidly evolving sector, while the IT landscape becomes more challenging. By Richard Giblin

2025-03-25

Creating A Safe & Healthy Workplace: 10 Essential Security Measures

Promoting a safe & healthy workplace isn’t just a response to current challenges; it’s an important aspect of risk management.

2025-03-27

Essential Strategies To Prevent Ransomware Attacks

Nurturing A Culture Of Protection: Banning ransom pay-outs addresses the symptoms, but we need to tackle the cause. By Robert Phan

2025-03-25

Manus - A Fully Autonomous Artificial Intelligence

Far-Reaching Implications: Manus operates autonomously, can multi-task seamlessly and complete jobs without instructions or human interaction.

2025-03-26

The Leading Russian Cyber Security Companies

Russian is strengthening its national cyber defences by requiring commercial organisations to connect to a unified cyber security system.

2025-03-24

British Science Minister Uses ChatGPT For Policy Advice

The Minister responsible for Science & Technology has defended his use of AI, saying that while he uses the tool, it does not replace expert advice.

2025-03-25

23andMe Goes Bankrupt Following Disastrous Data Breach

Millions of people will find that their DNA data has been put up for sale, as the human genetics company enters Chapter 11 administration.

2025-03-31

MS Windows Zero Day Vulnerability Widely Exploited

Update: A known security flaw in Microsoft Windows has been used by numerous state-sponsored groups for data theft and espionage since 2017.

2025-03-25

Taiwanese Hackers Accused Of Attacking China

There have been attacks targeting China's key infrastructure, including power grids, water supplies & telecommunications networks, since 2023.

2025-03-25

Combatting Rising AI Attacks With AI-Powered Defences 

User & Entity Behaviour Analytics: An effective approach to detect unknown threats by focusing on behavioural anomalies. By Kev Eley

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

MONITORAPP

MONITORAPP

MONITORAPP is responsible for complete web security. Protect your business environment with Application Security Solutions from MONTORAPP.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Nemstar

Nemstar

Nemstar is a specialist in Information Security & Cyber Training with over 25 years' industry experience.

Project Cypher

Project Cypher

Project Cypher leverages the latest cybersecurity developments, a world class team of hackers and constant R&D to provide you with unparalleled cybersecurity offerings.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Virtual IT Group (VITG)

Virtual IT Group (VITG)

VITG is a cyber security-focused Managed Service Provider (MSP).

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.

Executive Solutions USA

Executive Solutions USA

At Executive Solutions USA, our mission is to provide top-tier vCISO services that enable businesses to protect their critical assets and maintain a competitive edge.