News

2025-05-16

Iran Suffers A Large Scale Attack On Critical Infrastructure

A mystery attack appears to have targeted Iran’s controversial nuclear program to enrich uranium and enable nuclear weapon development.

2025-05-20

The Impact Of The Internet On Modern Society

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-15

Police Investigate Fake Council Tax Fraud

Cyber criminals have used a fake web address to divert payment of propery tax bills sent to 300,000 householders in Northern Ireland.

2025-05-20

Security Performance Metrics Fall Short

Align Security Metrics With Your Business Goals: As research reveals flaws in security performance, here are 4 ways to shift your team’s focus.

2025-05-20

Dior’s Client Data Has Been Breached

Contact Information, Purchases Data & Preferences Stolen: Luxury French fashion brand Dior is the latest retail company to be attacked.

2025-05-19

Kill Switches Secretly Installed In Solar Panels

Remotely Deactivated Power Inverters: Chinese made “kill switches” have been discovered hidden in solar panel controls, are an urgent warning.

2025-05-30

Crypto Company Hit For $400m

Coinbase Data Breach: One of the world’s largest crypto-currency firms has disclosed a disastrous cyber attack which has cost it around $400m.

2025-06-11

Recent Ransomware Attacks Have Focused On Identity Gaps

Invest In Preparedness: The convergence of cyber threats with essential services highlights the urgent need for organisations to shift their mind-set.

2025-06-06

China Introducing Strict Controls On AI Data Centres

China's plans to apply tighter regulatory controls over AI Data Centers could have significant effects on the crypto-currency market.

2025-05-16

Examining The NIS2 Directive From Outside The EU

The EU Network & Information Systems Directive 2: Its strengths, weaknesses, and a possible alternative path for the UK. By Notis Iliopoulos

2025-05-16

Lockbit Ransomware Group Hacked

Exposed: More than 70 LockBit administrators and affiliates, including plaintext passwords, as well as configurations of the LockBit ransomware code.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

SmartSearch

SmartSearch

SmartSearch is a leading online provider of Anti-Money Laundering and Fraud Prevention Services.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

Intertrust Technologies

Intertrust Technologies

Intertrust Technologies is a software company specializing in trusted computing products and services.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

JupiterOne

JupiterOne

JupiterOne is the security product that is changing how organizations manage and secure their software defined assets.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.