News

2024-07-12

The Growing Menace Of Ransomware

Understanding & Combating The Threat: By adopting proactive, multi-layered defences, businesses can reduce their vulnerability. By Pravesh Kara

2024-09-02

Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-07-10

Navigating The Complexities Of Data Backups In A Hybrid World

Going Hybrid: Many businesses mistakenly believe that cloud providers handle all backup needs, but this is usually not the case. By Brent Torre

2024-07-09

Breach Exposes Millions Of Mobile Numbers To Phishing Attacks

30m Users Exposed: Unidentified threat actors have exploited an unauthenticated endpoint in Authy’s MFA platform.

2024-07-11

Half Of Employees Don’t Report Security Mistakes

Despite increased security awareness training, more than half of cyber security professionals share concerns over security behaviours.

2024-07-09

Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware

Velvet Ant: A command injection exploit that allows an authenticated, local attacker to execute arbitrary commands without syslog alert messages.

2024-07-05

Inside The Mind Of A CISO

The AI Express: CISOs are divided in their attitude over what AI will mean for their organization and their own roles. By Nick McKenzie 

2024-07-05

UK vs. US: The Artificial Intelligence Landscapes Compared

Innovation Vs Pragmatism: While the US and UK are at the forefront of AI development, their approaches diverge significantly. By Bill Conner

2024-07-02

Cyber Threats To The British Elections

Imminent General Eelection: Threat actors could seek to exacerbate domestic political divisions regarding the primary electoral issues.

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-03

London Hospitals Were Attacked By Russian Hackers

An attack on the NHS was accurately predicted months before Russia's Qilin hackers struck London hospitals in a supply chain exploit.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

Booz Allen Hamilton

Booz Allen Hamilton

Booz Allen Hamilton is a management & tech consulting firm. Technology services include cloud computing, cyber security, systems development and integration.

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

National Centre of Incident Readiness & Strategy for Cybersecurity (NISC) - Japan

NISC was established as a secretariat of the Cybersecurity Strategy Headquarters in collaboration with the public and private sectors to create a "free, fair and secure cyberspace" in Japan.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

APrivacy

APrivacy

APrivacy provides information and communication security products for the financial services industry.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Militus

Militus

Militus provides the only information security service available that learns and analyzes your network over time using a custom-built network-based toolset.

SHIELD

SHIELD

SHIELD are the world’s leading cybersecurity company specializing in cyber fraud and identity solutions.

UnderDefense

UnderDefense

UnderDefense provides cyber resiliency consulting and technology-enabled services to anticipate, manage and defend against cyber threats.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Roundsec

Roundsec

Roundsec provide information security services including risk assessment and pentesting of sites and apps.

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.