News

2025-05-23

Large-Scale Data Exposure Discovered

Infostealer Malware: Research has uncovered a massive breach affecting 184 million records & accounts in a publicly accessed database.

2025-05-21

Pegasus Spyware Maker Fined

For the first time, a developer of spyware has been held responsible for exploiting vulnerabilities in smartphone platforms.

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-29

How Ransomware's Industrialization Impacts SOC Operational Tempo

The latest evolution of the ransomware industry is prompting security teams to adopt more modern tools & more agile workflows. By Matt Muller

2025-05-21

The Impact Of The Internet On Modern Society [extract]

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-20

Insurers Are Now Covering AI Malfunction Losses

The intersection of AI and insurance is evolving fast, offering efficiencies, but also demanding the careful management of risks & liabilities.

2025-05-16

Iran Suffers A Large Scale Attack On Critical Infrastructure

A mystery attack appears to have targeted Iran’s controversial nuclear program to enrich uranium and enable nuclear weapon development.

2025-05-20

The Impact Of The Internet On Modern Society

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

Devel Group

Devel Group

Devel are a LATAM cybersecurity company specialized in providing services in the financial and enterprise sector.

PSYND

PSYND

PSYND is a Swiss consultancy company based in Geneva specialized in CyberSecurity and Identity & Access Management.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

AppGuard

AppGuard

AppGuard prevents breaches by blocking applications from performing inappropriate processes using our patented dynamic isolation and inheritance technologies.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

White Cloud Security

White Cloud Security

White Cloud is a cloud-based Application Trust-Listing security service that prevents unauthorized programs from running on your computers.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Police CyberAlarm

Police CyberAlarm

Police CyberAlarm is a free tool to help members understand and monitor malicious cyber activity. This service is made up of two parts; monitoring and vulnerability scanning.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Zorus

Zorus

Zorus provides best-in-class cybersecurity products to MSP partners to help them grow their business and protect their clients.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.