News

2024-12-30

How CISOs Can Master Cyber Attack Communications

Under Pressure: The modern CISO's responsibility goes beyond technical leadership, especially when things go wrong. By Mark Bowling

2024-12-27

Using AI To Its Full Cybersecurity Potential

2024 Was The Year Of AI: We spoke to four industry experts to discover their predictions for 2025 when it comes to AI and its pros and cons. 

2024-12-20

Cybersecurity Challenges In Managing Learning Centres

Rising Threats: Understanding cyber threats to education centers and how you can leverage secure management systems to counter them.

2024-12-21

Cyber Attacks On Ukraine Government Agencies

Russia launches a mass cyber attack on Ukraine’s Justice Department, plus various state registries and government records offices.

2024-12-23

Quantum Computing Nears A Turning Point

From Promise To Reality: As quantum capabilities evolve, organizations must face the urgent need for quantum-safe solutions. By Tim Callan

2024-12-20

Working With Clients? Take a Good Look At Your Cybersecurity Trends

Remote work offers freedom, but not without risks. Stay ahead of cyber threats with these tips to protect your freelance business and clients.

2024-12-23

A Guide to Understanding Market-Leading Data Storage Solutions

Data storage can be a matter of business survival. Cyber resilience, quick recovery & a robust storage strategy are vital. By Billy Conway

2024-12-20

Cyber Risk & Resilience

Survey: Business leaders in the UK still don't seem to understand the significant potential financial losses if cyber risk is not properly addressed.

2024-12-18

General Motors Writes-Off $5bn On Robot Taxis

Autonomous vehicle technology turns out to be a lot harder than anticipated, as GM withdraws from the market, leaving it to Tesla & Waymo.

2024-12-17

The Proliferation Of Open Source Malware

Sonatype reports a 156% increase in open source malware in 2024, estimating that 50% of unprotected repositories contain open source malware.

2024-12-17

The Challenges Of Middle Management In Email Cybersecurity

Implications & Emerging Trends For 2025: Middle managers must be encouraged to take leadership accountability for cybersecurity. By Richard Bourne

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

AntemetA

AntemetA

AntemetA specializes in network infrastructure, security and cloud computing, helping companies transform their Information Systems.

Cask Government Services

Cask Government Services

Cask Government Services focuses on program management, cybersecurity, logistics, business analysis and engineering services for Federal, State and Local Government.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Elitecyber Group

Elitecyber Group

Elitecyber group is a team of Cyber Security recruitment experts who work for Cyber Security and Cyber Defence clients and candidates throughout Europe.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

TechForing

TechForing

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

NetSPI

NetSPI

NetSPI is an information security penetration testing and vulnerability assessment management advisory firm.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Faddom

Faddom

Faddom is an agentless tool that visualizes your on-premises and cloud infrastructure, as well as their inter-dependencies.