News

2024-10-09

Pakistan Joins The Top Tier Of Global Cybersecurity

Pakistan has moved up to join the Top 50 in the ITU Global Cyber Security Index, in major boost to international confidence in the national economy.

2024-09-24

Chinese Botnet Deployed To Infect Critical Infrastructure

Chinese threat groups are using rigged IoT devices to hack US and other organisations, presenting an increased threat to critical infrastructure.

2024-10-08

Truth & Lies About US Hacked Voter Data

Malicious actors want to undermine confidence in US election infrastructure. There is no sign the voting system has been compromised, yet.

2024-10-08

AI Is No Substitute For Cyber Experts

AI is not a replacement for human expertise, but a powerful tool that complements and enhances the capabilities of cyber security professionals.

2024-10-08

There Are Ways You Can Detect A Deepfake

Discerning Truth From Fiction: The rapid adoption of AI to to generate fictitious images makes it important to be able to spot deepfake content.

2024-10-07

Higher Education In Artificial Intelligence & Quantum Computing

The Chartered Institute of Information Security is adding AI & Quantum Computing modules to its CyberEPO for all students.

2024-10-07

Data Centres Are Just As Important As The Power Grid & Healthcare

The recent global IT outage caused by CrowdStrike has shown why keeping Data Centres secure and safe is critical to the UK.

2024-10-03

Bristol Will Spend £3.2M On Municipal Cyber Security

Bristol City Council is improving its cyber security through fears that an attack could damage delivery of critical public services.

2024-10-07

Cyber Workforce Growth Slows As Tight Budgets Restrict Hiring

The cyber workforce gap has grown to a record high of 4.8 million, with a total of 10.2 million security professionals now required to keep organizations protected globally.

2024-10-04

Protecting Company Data From The Risks Of Remote Working

Nine Key Cyber Security Measures: A recent Forbes Advisor survey showed that, of 1,100 respondents, 63% of worked remotely all or some of the time.

2024-10-03

Attackers Can Use RAM To Steal Data From Air-Gapped Networks

RAMBO: A new attack technique that relies on radio signals from memory buses to exfiltrate data from exceptionally high security air-gapped systems.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

Digittrade

Digittrade

Digittrade develop and produce external encrypted hard disks and secure communications apps.

Ergon Informatik

Ergon Informatik

Ergon Informatik AG is Switzerland's leading provider of customised software solutions and software products including fraud detection and the Airlock web security suite.

Risk Based Security (RBS)

Risk Based Security (RBS)

Risk Based Security provide the most comprehensive and timely vulnerability intelligence, breach data and risk ratings.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

Web3fied

Web3fied

Web3fied is a seed stage company building the future of decentralized digital identity and credentials management.

Quod Orbis

Quod Orbis

Quod Orbis are a fast-growing, innovative company providing market-leading expertise in cyber security and Continuous Controls Monitoring (CCM).

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Kaine Mathrick Tech (KMT)

Kaine Mathrick Tech (KMT)

KMT deliver comprehensive cyber-first outsourced technology support and solutions that scale with your business.

CyberE71

CyberE71

CyberE71 is an ambitious initiative serving as an umbrella for the UAE’s cybersecurity innovation ecosystem.

Reasonable Risk

Reasonable Risk

Reasonable Risk is the only SaaS GRC platform with Duty of Care Risk Analysis (DoCRA) built in, providing a sensible and defensible cybersecurity position for an organization.