News

2024-04-30

Protecting OT With MDR

Managed Detection & Response: How to beat the rising tide of cyber attacks in Operational Technology driven environments. By Yannis Velitsikakis

2024-04-29

What Can Be Done About Cyber Threat Actors Weaponizing AI?

AI enables cyber criminals at both nation state and cybercriminal level to compromise the security & integrity of target systems. By Graham Hosking

2024-04-30

AWS & Google Agree To Drop Cloud Service Exit Fees

Data Portability & Cloud Interoperability: A multicloud strategy is becoming less expensive, optimising the flow of data. By Jamil Ahmed

2024-04-29

Facing The Quantum Challenge

The End Of Encryption: The potential of quantum computing is undeniable, but so is the threat it poses to our digital security. By Jason Soroko

2024-04-25

Creating Successful Cybersecurity Solutions

From Bolt-On To Built-In: Not all cyber security resilience products are equal. What issues should software designers be focusing on? By Vincent Lomba

2024-04-24

Defending Your Supply Chain From Cyber Threats

Securing The Links: The implementation of best practices for supply chain security is a critical step in mitigating cyber risks. By Spencer Starkey

2024-04-24

US Legislators Want TikTok's Chinese Owners To Divest 

Election Year: TikTok could be banned in the US over urgent concerns about user data & electoral influence if the Chinese owners don't sell their stake.

2024-04-24

Four Ways To Overcome Cyber Security Career Challenges

Skills Shortage: It often takes a serious security breach or cyber attack for organizations to prioritize investment in cybersecurity skills.

2024-04-22

The Benefits Of Sharing Threat Intelligence

Companies must get a step ahead of malicious actors and using effective threat intelligence software can give proactive protection.

2024-04-23

EU Threatens TikTok Lite With Suspension

Money-for-Views: The European Union has demanded TikTok provide more information about a new app that pays users to watch videos.

2024-04-23

The Risks Of NIST Non-Compliance

Failing to adhere to NIST regulations can expose organisations’ sensitive data to a myriad of cyber threats & lead to long-term damage.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Trusted Objects

Trusted Objects

Trusted Object's mission is to provide state of the art security solutions and services enabling a strong root of trust for the IoT ecosystem.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Agile Underwriting

Agile Underwriting

Agile, an underwriting agency, insurtech and Coverholder at Lloyd's, provides niche insurance products across Aviation, Marine & Cargo, Cyber and Financial Lines.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

MindWise

MindWise

MindWise is a comprehensive global threat monitoring solution with implementations for fraud prevention and enterprise threat intelligence.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

Corgea

Corgea

Corgea is AI-powered security platform that finds, triages and fixes your insecure code.

TENEX

TENEX

TENEX is a cybersecurity company leveraging advanced artificial intelligence and human expertise to transform enterprise security.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an