News

2024-06-06

The Cyber Security Threat From Iran

Iran’s cyber operations are not limited to state infrastructure - they include harassment campaigns and attempts to intimidate individuals.  

2024-06-07

Fake News & Disinformation In Poland  

Destabilising European Elections: A fake news story saying Poles would be mobilized to fight in Ukraine was planted on a national news agency.

2024-06-07

Securing The Supply Chain

You're Only As Strong As Your Weakest Link: Resisting threats in your supply chain is a crucial part of protecting your business. By Tom Major

2024-06-06

The Cybersecurity Risks Of Generative AI

GenAI security risks are revealing themselves as multi-faceted threats that stem from how different users interact with the tools. By Jaimen Hoopes

2024-06-05

Hackers Target Healthcare

Serious breaches have very dangerous implications for the healthcare industry, sharpening the focus on how to protect medical data.

2024-06-06

London Hospitals Held To Ransom

Update: Seven London NHS hospital trusts have cancelled non-emergency operations and blood tests following a ransom attack by Qilin hackers. 

2024-06-04

You’ve Got Mail

Why Secure & Responsible Email Is Key to Safeguarding Our Data: The consequences of misusing it can be severe. By Anita Mavridis

2024-06-04

Identities Are The Highest Priority Risk Area

Focus On Identity Management: Senior security leaders’ support for Zero Trust is increasing, but skills and budgets aren’t keeping pace.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

2024-06-04

Germany’s Christian Democratic Party Attacked

A week before elections to the European Parliament, Germany's main opposition party has been forced offline by unidentified hackers.

2024-06-04

The Devastating Effects Of A Man-in-the-Middle Attack

Man-in-the-middle attacks are effective & worrisome because in many cases, the victim will have no clue that their communication has been compromised.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Hypori

Hypori

Hypori is a virtual smartphone solution that makes truly secure BYOD a reality for organizations in healthcare, finance, government, and beyond.

Securepoint

Securepoint

Securepoint is the market leader in the development of professional “Unified Threat Management” solutions in Germany.

Cytomic

Cytomic

Cytomic is the business unit of Panda Security specialized in providing advanced cybersecurity solutions and services to large enterprises.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

UK Research & Innovation (UKRI)

UK Research & Innovation (UKRI)

UKRI works in partnership with universities, research organisations, businesses, charities, and government to create the best possible environment for research and innovation to flourish.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

BridgingMinds Network

BridgingMinds Network

BridgingMinds Network is an industry leading best practices and IT security training provider in Singapore.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

Vertex Cyber Security

Vertex Cyber Security

Vertex provide Cyber Security Services to small to large businesses including Advise, Consulting, Adding Security Partnership, Penetration Testing, ISO 27001-2 and Audits.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.