FREE TO VIEW


« Back to News

2025-04-25

Traditional Cyber Insurance Isn’t Built For AI-Driven Attacks

Malicious Actors: As AI evolves, so does cybercrime - often outpacing the ability of businesses or insurers to respond effectively. By Randy Sadler 

2025-04-24

M&S Chaos: Leading British Retail Chain Attacked

Contactless payments have failed with many shoppers facing frustration at the checkout, as the company struggles to recover from a cyber attack.

2025-04-24

Apple & Meta Fined €700m By EU Commission

Breaches Of Digital Markets Act: Consumer choice and misuse of personal data are the key regulatory issues behind imposition of major penalties.

2025-04-24

How CISOs Can Speak The Language Of Risk & Resilience 

Boardroom Lingo & Accountability: The most effective CISOs today aren’t just securing infrastructure, they’re securing trust. By Tim Grieveson

2025-04-24

The Leading Israeli Cyber Security Companies [extract]

Israel is a powerhouse in the cyber security domain, with numerous start-ups, established companies, research institutions & government initiatives. 

2025-04-28

Quantum Computing Utility Will Be Achieved Within A Decade

Challenges in technical development, talent acquisition & executive-level understanding remain be overcome to support quantum development.  

2025-04-23

European Military & Government Data Networks Targeted

Russia is using sophisticated phishing methods to attack European governments & military data networks, using Remote Desktop Protocol.

2025-05-07

Chinese Hackers Undertaking A Global Infiltration Campaign 

Update: Chinese attackers have mapped critical infrastructure in preparation for future disruptions across twelve countries and twenty industries.

2025-04-22

Google's Online Advertising Technology Ruled Illegal

Monopoly Power: Google faces the possibility of US courts ordering it to sell assets or change its business practices to avoid anti-trust violations.

2025-04-23

The FBI Has Lost Track Of Its Hacking Tools

The FBI is secretive about its use of hacking tools, with very little information available about what the tools are, or what they are used for.

2025-04-18

Hackers Claim They Are Selling FortiGate Firewall Access

Zero-Day Vulnerability: The exploit appears to target versions of Fortinet's FortiOS, which was found to be susceptible to authentication bypass flaws.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XenArmor

XenArmor

XenArmor products include NetCertScanner, an enterprise software to scan & manage expired SSL Certificates on your local network or internet.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

CLUSIL

CLUSIL

CLUSIL is an association for the information security industry in Luxembourg.

AFCERT

AFCERT

AFCERT is the national Computer Emergency Response Team for Afghanistan.

PSW Group

PSW Group

PSW Group is a full-service Internet solutions provider with a special focus on Internet security.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Otorio

Otorio

OTORIO delivers industrial cybersecurity and digital risk-management solutions and services. We help our customers to keep their revenue-generating operations resilient, efficient, and safe.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

Gradient Cyber

Gradient Cyber

Gradient Cyber offer mid-market organizations enterprise-grade threat detection and response services at a fraction of the cost of an in-house SOC.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

X-Analytics

X-Analytics

X-Analytics is a cyber risk analytics application to create a better way for organizations to understand and manage cyber risk.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.