FREE TO VIEW


« Back to News

2025-05-02

Harrods Of London Comes Under Attack

London's famous luxury department store is the third major British retailer to confirm an attempted cyber attack, in what looks like concerted action.

2025-05-02

Cybersecurity In Smart Buildings

The Overlooked Risk In Digital Facility Management: By taking proactive steps today, building owners can avoid costly consequences tomorrow.

2025-05-01

Mastering Security In An Era Of Regulatory Shifts

Organisations need to change how they view email security and compliance, which is too often seen as a burden. By Nadine Hoogerwerf

2025-05-01

Co-op Shuts Down IT Systems After Attempted Hack

Another Big UK Retailer Targeted: The Co-op took preventive measures to protect its systems, shutting down business services for teams running stores.

2025-05-13

The Attack On M&S Reverberates Three Weeks Later

Update: Problems at M&S continue after a ransomware attack disrupted online services, internal systems and breached customer data.

2025-04-29

Five Top-Rated Threat Intelligence Platforms

Cyber Threat Intelligence: High quality analytics are priceless in curating thoughtful risk management and business continuity plans.

2025-04-29

British Government Needs To Lean On Automation To Bolster Cyber Resilience

Autonomous Endpoint Management: A precise overview of government IT assets & vulnerabilities, immediately improving cybersecurity. By Dan Jones

2025-04-29

Ransomware Attacks On The Energy Sector Surging

Operational Technology, Geopolitics & Hacktivism: Ransomware attacks targeting the energy and utilities sectors increased by 80% in 2024.

2025-04-29

Blackouts In Spain & Portugal Likely Caused By A Cyber Attack

Atmospheric Oscillation Or Hostile Action? A massive power outage has disconnected homes, industry and vital services across Spain & Portugal.

2025-04-28

Cybersecurity Risks In Legacy Scheduling Systems & How To Mitigate Them

Scheduling Software: Relying on legacy systems without actively investing in updates and patches can open businesses to cybersecurity risks.

2025-04-28

AI Uncovers A Cause Of Alzheimer’s Disease

Using AI, researchers at California University have revealed that there is a hidden DNA-binding function with a causal role in disrupting the brain.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

Internet Security Alliance (ISA)

Internet Security Alliance (ISA)

ISA is an international trade association providing thought leadership in advancing a sustainable system of cyber security.

Digital Infrastructure Association (DINL)

Digital Infrastructure Association (DINL)

DINL is the leading representative for companies and organisations which are active within the Dutch digital infrastructure sector.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

eCosCentric

eCosCentric

eCosCentric provides software development solutions for the IoT, M2M & embedded systems market.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Stairwell

Stairwell

Stairwell is building a new approach to cybersecurity around a vision that all security teams should be able to determine what’s good, what’s bad, and why.

Drata

Drata

Drata is a security and compliance automation platform that continuously monitors and collects evidence of a company's security controls, while streamlining workflows to ensure audit-readiness.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Archon Secure

Archon Secure

Archon GoSilent Cube delivers a CSfC-certified, plug-and-play security solution for classified and unclassified communication when using the public Internet.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Vaultinum

Vaultinum

Vaultinum are a trusted independent third party specialized in the protection and audit of digital assets.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.