News

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-29

How Ransomware's Industrialization Impacts SOC Operational Tempo

The latest evolution of the ransomware industry is prompting security teams to adopt more modern tools & more agile workflows. By Matt Muller

2025-05-21

The Impact Of The Internet On Modern Society [extract]

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-20

Insurers Are Now Covering AI Malfunction Losses

The intersection of AI and insurance is evolving fast, offering efficiencies, but also demanding the careful management of risks & liabilities.

2025-05-16

Iran Suffers A Large Scale Attack On Critical Infrastructure

A mystery attack appears to have targeted Iran’s controversial nuclear program to enrich uranium and enable nuclear weapon development.

2025-05-20

The Impact Of The Internet On Modern Society

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-15

Police Investigate Fake Council Tax Fraud

Cyber criminals have used a fake web address to divert payment of propery tax bills sent to 300,000 householders in Northern Ireland.

2025-05-20

Security Performance Metrics Fall Short

Align Security Metrics With Your Business Goals: As research reveals flaws in security performance, here are 4 ways to shift your team’s focus.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

H3Secure

H3Secure

H3 Secure focuses on Secure Data Erasure Solutions, Mobile Device Diagnostics and Information Technology Security Consulting.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Document Security Systems (DSS)

Document Security Systems (DSS)

DSS anti-counterfeit, authentication, and brand protection solutions are deployed to prevent attacks which threaten products, digital presence, financial instruments, and identification.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Syndis

Syndis

Syndis is a leading information security company helping to defend organizations by providing bespoke services and innovative security solutions in the global market.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Atlas Systems

Atlas Systems

Atlas Systems helps companies large and small accelerate their digital transformation journeys – expanding their capabilities and delivering tailored solutions including cybersecurity.