FREE TO VIEW


« Back to News

2023-11-17

Mid-market Organisations At Greater Risk

As large organisations grow more resilient, smaller mid-sized organisations must prioritise attack disruption as cyber-threats evolve. By Tim Anderson

2023-11-18

Surging Attacks On Israeli Websites

In parallel with continuing rocket attacks on Israel as it troops pursue Hamas in Gaza, hacktivist groups are delivering an offensive cyber campaign.

2023-11-18

Mitigating The Security Risks Of Black Friday 

Online data transfers significantly rise during Black Friday as consumers search for bargains, providing rich opportunities for cybercriminals.

2023-11-14

Australian Ports Recovering After Large-Scale Attack 

A cyber security incident shut down one of Australia's largest multiport port operators, affecting maritime freight in and out of the country.

2023-11-14

BEC Attacks: Trends & Predictions For 2024

BEC attacks pose a significant threat to businesses, but with the right defensive measures businesses can effectively mitigate these attacks.

2023-11-14

The Cyber Skills Gap Is Still Not Getting Better

Despite growing to 5.5 million professionals worldwide, the industry still needs millions of qualified workers to defend against digital threats.

2023-11-13

API Security Is A Critical Boardroom Issue

Application Programming Interfaces are in such widespread use that their security must be considered a fundamental requirement. By Gal Helemski

2023-11-09

British Online Safety Act Is Now Law

Reducing Harmful Social Media Content: A zero-tolerance approach to protecting children while giving adults more choices over what they see online.

2023-11-11

Attack On Chinese Bank Disrupts Financial Trading

The Ripple Effect: An attack on a major Chinese bank has resulted in disruption and completion failures in trades on US financial markets.

2023-11-12

Global Law Firm Breached & Data Stolen

International law firm Allen & Overy has disclosed it suffered a “data incident” resulting from an attack by the prolific LockBit ransom group. 

2023-11-10

Halting The Rise Of Ransomware

How Zero Trust Can Mean Zero Loss: Encryption & backups are critical to taking the sting out of hackers’ ransom demands. By John Michael

CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Huntsman Security

Huntsman Security

Huntsman Security provides technology to enable real-time security monitoring and immediate visibility of advanced threats and compliance issues.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Data Resolve Technologies

Data Resolve Technologies

Data Resolve offer a mechanism through which customers can detect and tackle various kinds of sensitive activities pertaining to data loss and data theft.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Tranchulus

Tranchulus

Tranchulus are a global provider of offensive and defensive cyber solutions, information security assessment, compliance and managed security services.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.

Sublime Security

Sublime Security

Sublime is an adaptive email security platform that combines best-in-class effectiveness with unprecedented visibility and control.

MirrorTab

MirrorTab

MirrorTab is a cyber security company providing advanced web security solutions that defend web applications against cyber threats like hacking and malware.