News

2025-01-24

LinkedIn Accused Of Misusing Private Messages To Train AI Models

LinkedIn Premium users have filed a lawsuit accusing LinkedIn of sharing their private messages with other companies to train their AI models.

2025-01-22

Cyber Attack Disrupts Eindhoven University 

A leading technical research university in the Netherlands is still recovering after being effectively shutdown by a debilitating cyber attack.

2025-01-23

Stargate - A Very Big Bet On AI Infrastructure

A $500billion investment in re-industrialising the USA, building a strategic capability to protect national security and competing with China.

2025-01-23

The Rising Threat Of Biometric Breaches & Stolen Data

Biometric data is increasingly a focus for criminals as they strive to steal valuable personal data to use against their targets. By Sam Peters

2025-01-22

Cyber Threat Forecast 2025 Part One - North America

Part 1 of a 4-part series that will forecast the international cyber threat landscape in 2025, beginning with North America. By Craig Watt

2025-01-20

Balancing Progress & Protection In Britain's Public Services

Citizen Experience: Transforming public services is a delicate process - innovation needs to be balanced with data protection. By Kam Bhatoa

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-21

How SASE Fits Into The Modern Cybersecurity Landscape

Attackers Are Faster, Smarter & Relentless: Phishing emails, ransomware and sophisticated attacks are the norm. Enter SASE.

2025-01-21

Ukrainian Hackers Attack Russian Financial Services

550TB Of Data Destroyed: Russia's leading online trading platform, Roseltorg, has been attacked by a pro-Ukraine hacking group, Yellow Drift.

2025-01-20

Remote Deletion Of Malware Enforced On Thousands Of Computers 

The US Justice Dept. has confirmed completion of an operation ordering removal of PlugX Chinese malware infecting over 4,000 computers.  

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Tukan IT

Tukan IT

Tukan IT provides a data classification and protection solution.

Communications Security Establishment (CSE) - Canada

Communications Security Establishment (CSE) - Canada

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

Viavi Solutions

Viavi Solutions

Viavi Solutions is a global leader in both network and service enablement and optical security performance products and solutions.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

FinCom.co

FinCom.co

FinCom.Co is the world’s first automatic AML/ KYC screening system, for comprehensive compliance.

SecureNation

SecureNation

SecureNation offers a wide variety of cutting-edge technologies and IT services to address almost any of your information security, network security and information assurance needs.

Cloud Box Technologies

Cloud Box Technologies

Cloud Box Technologies is one of the premier IT Infrastructure Solution providers in the Middle East.

Hunter Strategy

Hunter Strategy

Hunter Strategy focuses on delivering solutions that are concise, scalable, and target our customer’s complex technical challenges.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

CyberSentriq

CyberSentriq

CyberSentriq provides an unmatched combination of proactive AI-driven email and web security, advanced data protection, and operational resilience.