News

2024-12-16

Turning The Weakest Link Into Cybersecurity’s Strongest Line Of Defence 

Organisations can significantly reduce the risk of breaches by creating an informed workforce that understands cybersecurity threats. By Qasim Bhatti

2024-12-13

Best Cybersecurity Podcasts

A Key Medium: In technology, cybersecurity podcasts have taken the lead in fighting constantly fluctuating risks and digital security breaches.

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

2024-12-13

Chinese Firm Sanctioned For Potentially Lethal Cyber Attacks

Sichuan Silence: A Chinese cyber security firm has been sanctioned by the US for attacks exploiting a software vulnerability in corporate firewalls.

2024-12-13

Speciality Bakery Chain Hacked 

Krispy Kreme Donuts: A major cyber attack disrupted systems which resulted in lost production at the leading specialist bakery and retail outlet.

2024-12-12

What Security Features Are Essential In BPM Software To Protect Sensitive Data?

Effective business process management goes beyond spotting discrepancies. Good BPM software tools can streamline processes & maximize output.

2024-12-12

Strengthening Britain's Cyber Defences

Robust Regulation & Proactive Measures: Are current regulations good enough to tackle the sophisticated threats the UK faces today? By Rahul Tyagi

2024-12-18

Trump 2.0: Cyberwarfare To Reach New Heights

With a realignment in world power dynamics, Trump's USA faces serious challenges for global cybersecurity throughout 2025. By Craig Watt

2024-12-11

FBI & CISA Advice - Use Encrypted Messaging

In response to the threat from Salt Typhoon's exploits, US mobile and broadband users are advised to adopt fully encrypted messaging services.

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

2024-12-11

British NHS Hospitals Under Attack

A Ceaseless Target: Ransom attacks on three Liverpool hospitals are just the latest in a series against NHS healthcare organisations in 2024.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Corsa Security

Corsa Security

Corsa Security is leading the transformation of network security with a private cloud approach that helps scale network security services with unwavering performance and flexibility.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Avalanchio Technologies

Avalanchio Technologies

The Avalanchio platform gives you a complete solution to collect, process, and analyze security data to detect threats in real-time and analyze historical data using security DSL or SQL.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

RST Cloud

RST Cloud

RST Cloud is a cutting-edge technology company that specialises in threat intelligence solutions for businesses of all sizes.

Neo Auth

Neo Auth

Neo Auth is an identity and access management solution to help organizations optimize their cybersecurity processes.

Tulpa AI

Tulpa AI

Tulpa develops safe AI assistants (co-pilots) to support and enhance human performance in high-stakes, mission-critical decision-making environments.