FREE TO VIEW


« Back to News

2025-08-04

Cybersecurity Leadership - The 15% Advantage

Although over ninety per cent of CISOs are familiar with crowdsourced security, only about fifteen percent make entire use of its full potential.

2025-08-04

Sophisticated Infostealer Operation Targets Telegram, Dropbox & Cloudflare

PXA Stealer Exploit: Blending legitimate tools from with advanced evasion techniques to bypass traditional defences to harvest data for resale.

2025-08-01

AI Transforms Google Search: What It Means For Users, Websites & The Internet [extract]

AI Overviews: Google has begun streamlining users search experiences by delivering direct answers at the top of the search results page.

2025-08-01

Hackers Have Stolen US Insurance Customer Data

Hackers have stolen personal data from a majority of insurance firm Allianz Life's 1.4 million customers in the US.

2025-08-01

Student Jailed For £100M Phishing Fraud Scheme

A University student who sold thousands of phishing kits used to defraud victims of millions of pounds, has been jailed for seven years. 

2025-08-01

BitSight Reveals Critical Gaps & New Cybersecurity Priorities For Organisations

Cybersecurity Is At A critical Juncture: AI-driven threats and expanding attack surfaces demand a shift in how organisations manage cyber risk.

2025-08-01

Cloud Security Posture Management Emerges As A Key Element In Cyber Security

Rise Of CPSM Is A Potential Game-Changer: Market set to grow at a CAGR of 10.6% to reach $14 Billion by 2034, as cloud adoption accelerates.

2025-08-01

2025 - Overview of Ransomware Trends

Cyberattacks are increasing in sophistication, particularly those targeting Identity & Access Management systems, such as Active Directory.

2025-07-31

Underfund Youth Today, Undermine Cybersecurity Tomorrow

Cyber's Future Rests On Two Pillars: Meaningful investment in people & repair of the broken entry pathways into the industry. By Adam Blake

2024-07-31

Semperis Ransomware Risk Report Highlights Alarming Trends

Board-level Engagement & Continuous Vigilance: Ransomware has a devastating impact and there is an urgent need for better cyber resilience.

2025-07-30

Unravelling Silk Typhoon’s Capabilities

China’s Cyber Web: Detailed analysis by SentineOne reveals the growing threat of state-backed cyber actors exploiting software vulnerabilities.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

MainNerve

MainNerve

MainNerve helps secure networks, applications, people, and facilities… enabling businesses to reduce risk and increase their cybersecurity posture.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

RankedRight

RankedRight

RankedRight empowers security teams to take immediate action on their most critical risks.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

MyKRIS Asia

MyKRIS Asia

MyKRIS specialise in providing and managing Internet network services and cyber security services to enterprises.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.

TDi Technologies

TDi Technologies

TDI Technologies' flagship solution ConsoleWorks, is an IT/OT cybersecurity and operations platform for Privileged Access Users.

ThingsRecon

ThingsRecon

ThingsRecon empowers organisations to continuously map and manage their attack surface, uncover hidden vulnerabilities, and assess supplier cyber hygiene.