FREE TO VIEW


« Back to News

2025-06-05

Police Shut Down A Criminal Malware Operation

EU & US police have taken down AVCheck, a powerful cyber crime system used by hackers to test if security tools could detect their malware.

2025-06-04

Major Cybersecurity Risks In 2025 & How VPNs Help Defend Against Them

VPNs are essential if you want to stay private & secure online. When used correctly with other practices a VPN can make a huge difference.

2025-06-13

Jony Ive Partners With OpenAI To Redefine AI Hardware

Described by OpenAI CEO Sam Altman as the “greatest designer in the world,” Ive takes on a leading role in design and creative direction at OpenAI.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-06-10

Critical Vulnerabilities Disclosed In Versa Concerto

Exploits In The Wild Place Organisations At Risk: An authentication bypass enables attackers to gain admin access & execute commands remotely. 

2025-06-02

British NHS Trusts Hit By Major Cyberattack: Data Stolen  

Healthcare Trusts In London & Southampton Targeted: Patient data may have been compromised due to an Ivanti Mobile Endpoint vulnerability.

2025-05-01

Introducing Modern SecOps, a more realistic alternative to the “autonomous SOC” 

Modern SecOps: Better execution, efficiency, and analyst satisfaction with this new model. By Eoin Hinchy Learn more.

2025-06-11

The Future Of AI Is On-Device

Private By Design: On-Device AI addresses the privacy issues of cloud-based models by putting control in the hands of the user. By Rob Moffat

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

2025-05-01

The Top Seven Skills Security Analysts Need To Succeed, According To Security Leaders

Demand for security analysts is rising rapidly. How can security analysts stand out to hiring managers? Learn more.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

National Crime Agency (NCA) - United Kingdom

National Crime Agency (NCA) - United Kingdom

The NCA's Cyber Crime Unit focuses on critical cyber incidents in the UK as well as longer-term activity against the criminals and the services on which they depend.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

TruSTAR Technology

TruSTAR Technology

TruSTAR is a threat intelligence exchange platform built to protect and incentivize information sharing.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

T-REX

T-REX

T-REX is a coworking space, technology incubator, and entrepreneur resource center for technology startups.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

Virtual Technologies Group (VTG)

Virtual Technologies Group (VTG)

Virtual Technologies Group is a single source, IT product and services provider for SMBs and IT departments, delivering reliable, cost-efficient service, maintenance and support solutions.

Cysmo Cyber Risk

Cysmo Cyber Risk

Cysmo is an innovative cyber risk assessment platform specifically designed for the needs of the German insurance industry.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.