News

2024-05-13

Notorious Cyber Criminal Sentenced

Ransom_Man: A notorious hacker has been jailed for blackmailing 33,000 psychotherapy patients after stealing their personal medical notes.

2024-05-08

Israel’s ‘Cyber Dome’ Defends Against Iranian Hackers

A Silent Invisible War: Israel has been developing its defences against cyber attacks, to function like the Iron Dome against missile attacks.

2024-05-13

Russia’s Malicious Cyber Activity Condemned

Britain has joined with the EU, Germany and Czechia in condemnation of burgeoning malicious cyber activity by Russian spy & intelligence agencies.

2024-05-07

Neutralizing Cyber Threats In SaaS Applications

Any business using SaaS applications opens itself to numerous security risks. Here are the best practices to prevent costly breaches. By Matt Verlaque

2024-05-08

Microsoft Reforms ‘Weak’ Cyber Security Strategy

Do Security: Microsoft's reputation for security is suffering after criticism of the company’s weak cyber practices and lax corporate culture.

2024-05-20

Cyber Tensions & Capabilities In Asia

Governments across the Asia-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity.

2024-05-19

Ukraine Has An AI-Generated Government Spokesperson

Digital Diplomat: Ukraine has an AI-generated spokesperson called Victoria Shi who will make official statements on behalf of its Foreign Ministry.

2024-05-08

New AWS Webinar: Harnessing The Power Of SIEM

On Demand: In this AWS and SANS webinar, experts will help you understand how to most effectively use Security Information & Event Management.

2024-05-17

The Ransomware Threat Landscape Is Diversifying

Ransomware & Digital Extortion: The frequency of attacks is going up, partly driven by smaller new threat groups becoming more active.

2024-05-16

The Global Corporate Digital Security Landscape

Suspicious Internal Activity: Attackers persistently seek to infiltrate organisations by abusing the trust inherent in vendor-client connections.

2024-05-07

The US Has A New Global Cyber Security Strategy

After years of escalating threats from China, Russia and cyber criminals, the US wants to build up international cyber security cooperation.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

Inceptus

Inceptus

Inceptus is a next generation Managed Security Service Provider (MSSP). We are dedicated to keeping our customers safe, secure and protected while doing business on the Internet.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Tozny

Tozny

Tozny offers products with security and privacy in mind that are built on the foundation of end-to-end encryption, and open-source verifiable software.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

Epic Machines

Epic Machines

Epic Machines is a Value Added Reseller and Managed Security Services provider offering Security Transformation using Cloud-native solutions to commercial and government markets.

Huntr

Huntr

Huntr provides a single place for security researchers to submit vulnerabilities, to ensure the security and stability of AI/ML applications.

Spectrotel

Spectrotel

Spectrotel, a trusted provider of Managed Network Solutions, elevates your network with solutions built on cutting-edge technologies.