News

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-20

Quantum Computing Security Could Solve The Data Sovereignty Challenge

What can organisations do to ensure their data processing remains on the right side of the law when managing data sovereignty? By Adrian Fern

2024-08-17

A New Microsoft Vulnerability Warning

Just a month after the Crowdstrike incident, another vulnerability has been found in Windows that can result in the 'Blue Screen of Death' error.

2024-08-19

Five Critical Security Benefits Of CIAM

Customer Identity & Access Management: A system to manage the identity & access requirements of customers interacting with digital services.

2024-08-16

Revolutionizing Legal Research & Document Analysis With RAG Technology

Retrieval-Augmented Generation: An AI-driven technology is reshaping the legal industry by enhancing efficiency, accuracy, & depth of legal work.

2024-08-19

Cyber Insurance: The Cost Of Doing Business

Ransom Attacks & Extortion Demands Are Soaring: The question for any company is what would you pay and what does it cost to defend yourself?

2024-08-19

Resilience As Regulation: Preparing For The Impact Of CER

EU Critical Entities Resilience Directive: Along with NIS2, the CER will change the way organisations think about security. By Andrea Monteleone

2024-08-15

Business Identity Theft: Saving The Digital World From Fake Businesses

Protect Your Business From Identity Theft: Discover how to identify fake businesses and safeguard your digital presence today. By Sophie Martin

2024-08-16

Trump Campaign Emails Hacked

Update: Donald Trump’s election campaign claim that its internal communications have been hacked by the Iranian government looks credible.

2024-08-16

EU Regulators Threaten To Prosecute Elon Musk

Illegal Content: The European Union is heading for a confrontation with Elon Musk following his live interview with Donald Trump on X.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

mnemonic

mnemonic

mnemonic helps businesses manage their security risks, protect their data and defend against cyber threats.

ThreatQuotient

ThreatQuotient

ThreatQuotient delivers an open and extensible threat intelligence platform to provide defenders the context, customization and collaboration needed for increased security effectiveness.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

Sherweb

Sherweb

Sherweb are a marketplace of leading cloud solutions and value-added services delivered by a team of passionate experts invested in MSP growth.

Cytacs

Cytacs

Cytacs is the AI-powered cyber security platform specifically designed for small and medium-scale enterprises.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.