News

2024-11-04

The US Has A New AI Strategy 

As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

2024-10-29

Google Urges Windows Users To Update Chrome Amid New Security Threats

Urgent Alert: When you keep your software updated it makes you safer online, improves your experience, and protects your important data.

2024-11-01

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

AWS Webinar: Hear security experts break down myths and realities of next-generation firewalls, how to use them & how to boost your security posture.

2024-11-01

Are Businesses Adopting A ‘Titanic Mindset’ To Data Recovery?

Sinking Feeling: One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young

2024-10-31

Preparing IT Teams For The Next AI Wave

The growing importance of AI has created a compelling reason for IT departments to address risk and compliance with renewed urgency.

2024-11-01

Cyber Security Teams Feel The Pressure 

Understaffed, Overworked & Underfunded: Cyber security teams are also suffering from major skills gaps and a shortage of well- trained people.

2024-10-31

2024 US Presidential Election Cyber Intrusion: Part 5 - Cybercrime Threats

USA 2024 Elections: With the polls even, what is the potential for collaboration between Nation State Actors & Cybercrime Groups? By Craig Watt ​​​​​​​

2024-10-31

What Industrial Organisations Can Learn From Nation-State Cyber Attacks

Risk Management: Often conceived without cybersecurity in mind, many industrial devices lack basic security measures and controls. By Edgardo Moreno

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CyberDefenses

CyberDefenses

CyberDefenses services combine best-in-class cybersecurity oversight, managed services and training to help our clients truly address their cybersecurity challenges.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

RealTyme

RealTyme

RealTyme is a secure communication and collaboration platform with privacy and human experience at its core.

Interactive

Interactive

Interactive are a leading Australian IT service provider with services in Cloud, Cyber Security, Data Centres, Business Continuity, Hardware Maintenance, Digital Workplace, and Networks.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

Claratti

Claratti

Clarrati are a team of innovators. Industry leaders in the cloud computing, remote working, and work-from-home space. We partner with you to empower your business for the future.

Qwiet AI

Qwiet AI

At Qwiet AI we enable you to prevent cyberattacks by securing code from the start. Secure code in three steps.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.