News

2025-01-06

How Small & Medium Businesses Can Safeguard Their Critical Assets Against Evolving Cyber Threats

Understanding security threats coupled with concrete, affordable strategies is key to enabling SMBs to build a resilient cybersecurity culture.

2025-01-01

Chinese Hackers Penetrated The US Treasury

The US Treasury Dept. has disclosed that it has fallen victim of what it describes as a ‘major cyber security incident’ which it blames on China.

2025-01-02

Volkswagen Suffers A Massive Data Breach

The personal information of 800,000 VW electric vehicle owners, including location data and contact details, was left exposed for months.

2025-01-03

Artificial Intelligence Presents Urgent Risks

Potentially Very Dangerous Technology: An eminent scientist is warning that AI could wipe out the human race within the next decade.

2025-01-03

Hackers Deploy Malicious Chrome Extensions

Supply Chain Attack: A large-scale hacking campaign targeting Chrome extensions has affected customers of a leading cyber security firm.

2024-12-31

China Complains About US Cyber Attacks

Pot, Kettle, Black: US Intelligence agencies are accused of hacking Chinese technology companies to extract commercial secrets and other IP.

2024-12-27

IoT Devices Infected With Pre-Installed Malware

BadBox: Android malware embedded in the device’s firmware, which enables interception of private credentials & can install other malicious software.

2024-12-31

Ireland - The EU's Data Repository

The growth of the cloud storage sector in Ireland is so rapid that it is threatening the country’s legally binding commitments to 'Net-Zero'.

2025-01-02

Cybersecurity: What Can We Expect In 2025?

The prospect is for continued turbulence, shaped by evolving attack vectors, regulatory pressures & geopolitical conflict. By Vincent Lomba

2024-12-27

Means, Motives & Opportunities

Relentless Cyber Criminals: Exploring the risk factors that will drive cyber attacks and the threats they will generate in 2025. By Kurt Thomas

2024-12-30

Cybersecurity Measures To Enhance Data Security In 2025

As we enter 2025, here are four predictions for organisations who want to take steps to protect themselves from cyber attacks. By Rick Goud

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CyberSource

CyberSource

CyberSource provides online payment and fraud management services for medium and large-sized merchants.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

AVANTEC

AVANTEC

AVANTEC is the leading Swiss provider of IT security solutions in the areas of cloud, content, network and endpoint security.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.