News

2025-03-11

DOGE Is Undermining US Government Cyber Security

The US Dept. of Government Efficiency has unprecedented access to highly sensitive federal databases & payment tools, with perilous consequences.

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-12

Cyber Attackers Strike X

Update: Dark Storm claim responsibility for the extensive outage on the X social media platform in a well-resourced, co-ordinated attack.

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

2025-03-10

The Shadow IT Problem No One Talks About

To avoid exposure to breaches & compliance failures, organisations need a proactive approach to simplifying network complexity. By David Brown

2025-03-09

Data Breaches Cause A Financial Burden

A Multi-Faceted Approach: Risk leaders identify data breaches as a leading source of man-made disruptions causing financial burdens.

2025-03-06

Chinese Hackers Indicted

US Treasury Breach: Dept. of Justice prosecutors have charged 12 Chinese nationals for being part of an alleged hacking campaign.

2025-03-05

Apple Takes Legal Action Over Data Privacy

Investigatory Powers Tribunal: Apple is taking legal action over the UK government efforts to force the company to weaken iCloud encryption.

2025-03-04

The Urgency Of AI Governance

Rapid Adoption Of AI-Driven Solutions: The lack of proper AI governance exposes businesses to financial, regulatory & reputational risks.

2025-03-03

Frontend vs Backend vs Full Stack: What’s The Difference?

Full-stack, Backend & Frontend: How does a full stack development company employ each of these skill sets to build seamless digital experiences?

2025-03-03

Cyber Command Ordered To Cease Hacking Russia

Defence Secretary Pete Hegseth has ordered the US military to pause offensive cyber operations against Russian targets.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

ValidSoft

ValidSoft

ValidSoft is a security software company, providing telecommunications-based multi-factor authentication, identity and transaction verification technology.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Quantifind

Quantifind

Quantifind enables financial crimes/fraud analysts and investigators to make better decisions, faster, with intelligent automation.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

AKIPS

AKIPS

AKIPS develops the world's most scalable network and infrastructure monitoring software, delivered as a turn-key software appliance.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.