News

2024-06-19

Combatting Zero-Day Exploits In Financial Services

Best Practices For Finance Institutions: Zero-day attacks disrupt critical systems, causing downtime & big operational challenges. By Dominik Birgelen

2024-06-18

Top Ten IoT Security Challenges & Solutions

The interconnected nature of IoT devices amplifies the importance of maintaining strong security practices across all levels of the network.

2024-06-18

Chinese Hackers Have A Global Impact

Chinese state-sponsored hackers gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw.

2024-06-18

Taming Aggressive Algorithms

Child Protection: The British regulator has new rules to protect children online, part of a draft Children's Safety Codes of Practice. By David Varney

2024-06-17

Instagram & Facebook Are Addictive For Children

Negative Effects: The EU is investigating Meta's Facebook and Instagram social media platforms over concerns for children's mental health.

2024-06-14

The Internet Is Good For You

Internet Access Improves Personal Well-Being: People with Internet access or actively using the Internet report greater levels of life satisfaction.

2024-06-13

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit

EC-Council's Pro-Bono Cyber AI Toolkit: Setting New Standards for Cybersecurity Training in the US for its Certified Members.

2024-06-14

Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

An average cybersecurity stack comprises 32 solutions, highlighting the need for consolidated platforms to deal with growing complexity.

2024-06-13

AI-Generated Misinformation - A Growing Concern For 2024 Elections

Cybersecurity & Trust: Concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election.

2024-06-13

Protecting Data In The Remote Working Era

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-12

Cyber Criminals Do Not Care Who Falls Victim

Attacks on Santander and NHS London demonstrate why cyber insurance should be part of every business' resilience strategy. By Marc Rocker

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CNCERT/CC

CNCERT/CC

CNCERT is the national Computer Network Emergency Response Technical Team / Coordination Center of China.

Octopus Cybercrime Community

Octopus Cybercrime Community

The Octopus Community is a platform for information sharing and cooperation on cybercrime and electronic evidence.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Secon Cyber Security

Secon Cyber Security

Secon Cyber Security is an Advanced Managed Security Services Provider with long standing experience of providing cyber security solutions to customers ranging from small to large enterprises.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Newtec Services

Newtec Services

IT should be responsive, adaptive, and smart. Now more than ever, you need a business that runs efficiently and can adapt to today's challenges. We can help with custom IT solutions.

Matrixforce

Matrixforce

Matrixforce is a vetted IT support provider that uses the patented Delta Method of streamlining technology for financial and professional service firms to reduce complexity and avoid risk.

Aiden Technologies

Aiden Technologies

Aiden simplifies your IT process, giving you peace of mind and security by ensuring your computers get exactly the software they need and nothing else.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Federal Bureau of Investigation (FBI) - USA

Federal Bureau of Investigation (FBI) - USA

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Locuz

Locuz

At Locuz, we’ve made it our mission to help businesses like yours create an actionable digital strategy.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

X-PHY

X-PHY

X-PHY is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core.

Cyber Security Centre for the Isle of Man (CSC)

Cyber Security Centre for the Isle of Man (CSC)

The Cyber Security Centre for the Isle of Man is responsible for the delivery of the Isle of Man National Cyber Security Strategy.