News

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-08

Which Cybersecurity Trends Will Dominate 2025?

Organisations need to brace for a wave of threats driven by advanced technologies and increasingly sophisticated attack vectors. By Paul McLatchie

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

2025-01-13

The British Government’s AI Action Plan 

The new AI regime in Britain could facilitate a “sweet spot”, attracting the sort of investment and innovation intended to boost economic growth. 

2025-01-10

Q3 2024: Over Half A Million Cyber Attacks On Critical Infrastructure

The attack surface has never been wider, threat actors are broadening their horizons, while ransomware groups are becoming more sophisticated.

2025-01-10

AI-Enhanced Attacks Are A Rising Threat

As AI is more widely adopted, companies are creating more vulnerabilities within their own organisations and attacks will become more sophisticated.

2025-01-11

CISA Finds Serious Problems In Oracle & Mitel Systems

Known Exploited Vulnerabilities: Thousands of network servers found to be exposed to unauthorised admin access and data extraction.

2025-01-09

How To Streamline Compliance With NIS2 & DORA 

Managed Detection & Response: A proactive approach that enables organisations to meet the demands of NIS2 & DORA effectively. By Notis Iliopoulos

2025-01-10

How “Right-Sizing” Cybersecurity Initiatives Can Prevent Data Loss

Striking a balance between data protection, cost-effectiveness, usability, and discovering an approach to cybersecurity that works for your business.

2025-01-09

Looking Ahead Of The OMB Zero Trust Mandate In 2025

The Benefits Are Clear: Zero Trust is revolutionizing how organizations safeguard their environments. By Dylan Owen

2025-01-08

What SMBs Already Know About Ransomware & How To Build On It

Despite their differences, ransomware criminals and small business owners manage operations similarly. Let's explore their commonalities.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Mega

Mega

Mega is a secure cloud data storage provider with browser-based high-performance end-to-end encryption.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

Radiflow

Radiflow

Radiflow is a leading provider of cyber security solutions for critical infrastructure networks (i.e. SCADA), such as power utilities, oil & gas, water and others.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

Triaxiom Security

Triaxiom Security

Triaxiom Security offers penetration testing, security audits, and strategic consulting customized to meet your needs.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.

Trustlink Technologies

Trustlink Technologies

Trustlink Technologies is an information technology company founded with a steadfast vision to fortify the digital landscapes of businesses through a foundation of trust.