FREE TO VIEW


« Back to News

2023-08-14

DORA: Compliance With The EU Digital Resilience Act

The deadline for complying with the new DORA rules is approaching. What is it & what are the risks of non-compliance? By Christopher Gill

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-14

Embracing The Passwordless Future

Strengthening Security & User Experience: Passwords are not only a security risk but also a big source of frustration for users. By Mesh Bolutiwi

2023-08-11

Massive Breach Of British Voter Data

Unknown hackers have obtained the details of tens of millions of British voters in a complex cyber attack on the Electoral Commission.

2023-08-11

Police Officers At Severe Risk As Personal Data Exposed

Critical Incident: Northern Ireland police officers & staff have rendered vulnerable after a massive data breach published their personal details.

2023-08-10

Threads Loses 50% Of It’s Users

Facebook’s parent, Meta, is working fast to launch a desktop version of its new social media platform to help user retention.

2023-08-10

Hot Topic Under Attack

The retail chain with 675 stores across the US, has fallen under attack with multiple hacking attempts.

2023-08-10

Online Safety Act Places US Adults At Risk

Unintended Consequences: Utah has a new law requiring adult websites to verify the age of their users.

2023-08-10

Fighting Fake News Using Machine Learning & Blockchains

The proliferation of misinformation and fake news in the digital age has become a critical societal concern.

2023-08-10

EU Proposed AI Legislation Is A Threat To Open Source Software

Governments around the world are wrestling with the best way to tackle regulating Artificial Intelligence using an international framework.

2023-08-10

Google Join With Microsoft, OpenAI & Anthropic To Regulate AI Development

Leading Artificial Intelligence (AI) firms have assembled the Frontier Model Forum to regulate the development of cutting-edge AI technology.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Check Point SASE

Check Point SASE

Check Point SASE (formerly Perimeter 81) is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.

ProSearch Partners

ProSearch Partners

ProSearch Partners are national talent acquisition specialists exclusively focussing on Technology and Digital talent including Cybersecurity, Data Analytics and Execs.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL)

Pakistan Telecommunication Company Limited (PTCL) is the largest integrated Information Communication Technology (ICT) company of Pakistan.

Kennedys

Kennedys

Kennedys is a global law firm with expertise in litigation/dispute resolution and advisory services, particularly in the insurance/reinsurance and liability sectors, including cyber risk.

Kriptos

Kriptos

Kriptos helps businesses improve their cybersecurity, risk, and compliance strategies by locating critical information through a technology that automatically classifies and labels documents using AI.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.

Palindrome Technologies

Palindrome Technologies

Palindrome Technologies help clients defend against cyberattacks across all attack surfaces, including hardware, software, network-to-cloud, people, and emerging technologies.