FREE TO VIEW


« Back to News

2023-10-09

Garbage In / Garbage Out: Training AI Algorithms

One of the risks posed by AI technology is the significant security threat to the vast data needed to train their algorithms & improve performance.

2023-10-09

Cyber Incidents At British Firms Up 25%

Less than half of British companies are confident in their ability to handle the biggest threats facing organisations, including phishing & malware.

2023-10-06

Safeguarding Businesses From Security Challenges In Advertising

Navigating The Pitfalls Of Google’s AI Data Privacy: Giving up control over ad placement is convenient, but carries several risks. By Mathew Ratty

2023-10-06

The Role of Circuit Breakers In Cybersecurity

The Importance Of Electrical Power: Circuit breakers can prove to be an invaluable asset as they help keep the cybersecurity infrastructure intact.

2023-10-05

Indian Police Crackdown On Social Media Financial Fraud

Victims were defrauded with the promise of huge returns on small investments, contacting them via the WhatsApp & Telegram instant messaging apps.

2023-10-06

Top Five Cloud Penetration Testing Tools

Cloud penetration testing is focused exclusively on cloud infrastructure. What are the current best tools & methodology? By Vidushi Dubey

2023-10-08

Industrial Control Systems Company Held To Ransom

Update: An international supplier of building technology & control systems has been attacked by the 'Dark Angels' ransomware gang.

2023-10-04

The Impact Of Artificial Intelligence On Cybersecurity

Balancing Promise With Reality: The belief that Artificial Intelligence alone can guarantee cybersecurity is overhyped.. By Helen Kruger

2023-10-03

Mapping Out The Journey To Zero Trust

Zero Trust has emerged as the gold standard cybersecurity methodology, but adopting it is a long term, evolutionary process. By John Linford

2023-10-03

Key Security Risks For Small Businesses

Lack Of Resources, Awareness & Expertise: Small businesses are as much at risk of cyberattacks as larger enterprises. By Jason Manar

2023-10-03

Security Gaps In Business-Critical Identity Services 

Active Directory Exploits: Cybercriminals aim to expand an attack from one compromised user account to the entire IT infrastructure. By Mickey Bresma

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

Athena Dynamics

Athena Dynamics

Athena Dynamics focuses on Cyber Security, especially in Critical Information Infra-structure Protection and Enterprise IT Operation Management products and Services.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

CybExer Technologies

CybExer Technologies

CybExer provide an on-premise, easily deployable solution for complex technical cyber security exercises based on experience in military grade ranges.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

HORNE

HORNE

HORNE is a professional services firm supporting clients in public, private & government sectors nationwide.

PKF Infuse

PKF Infuse

PKF Infuse provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Rimstorm

Rimstorm

Rimstorm’s mission is to significantly improve the security of your data using award-winning, state-of-the-art technology combined with cyber managed security services.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

AI Spera

AI Spera

AI-Driven Cyber Threat Intelligence Security. AI Spera provides real-time intelligence to empower your security competences in all aspects of the business.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.