FREE TO VIEW


« Back to News

2023-07-04

The Nuclear Governance Model Won’t Work For AI

AI is increasingly discussed as an existential threat on the same scale as nuclear weapons. This parallel distorts the conversation about regulation.

2023-07-03

The CIA Has A Social Media Campaign Just For Russians

The campaign includes a new CIA channel on Telegram - a widely used social media network that offers a source of unfiltered news in Russia.

2023-07-03

Canada Might Lose Its Dispute With Google

Costly News Links: Google and Meta, the owner of Facebook and Instagram are saying they will block local news from their platforms in Canada.

2023-07-03

Thousands Of WordPress Sites Exposed 

Ultimate Member Plugin: Over 200,000 WordPress sites have a newly found security defect, leaving them dangerously exposed to hackers.

2023-07-03

The Seven Stages Of Cyber Resilience:

The Emotional Roller Coaster Of Data Protection: For small & medium businesses, data resilience is a critical necessity. By Richard Massey

2023-07-03

How To Back Up GitLab To Prevent Data Loss 

GitLab Backup Methods: Streamlining backup processes, ensure data reliability & let DevOps focus on their core development tasks.

2023-06-29

Today’s CISO: How The Role Has Evolved

A Transformational Role: CISOs are integral to fundamental business decisions and are now entitled to a seat at the boardroom table. By Frank Kim

2023-06-28

Browser-Based Social Engineering Trends

Watchguard's latest report shows three of the four new malware threats originated in China and Russia with living-off-the-land attacks on the rise.

2023-06-28

Phishing – It’s Not About Malware (Or Even Email)

Phishing Is No Longer About Infecting Your Computer: Experts at SANS have analysed the latest trends and key indicators. By Lance Spitzner

2023-06-27

Innovation In Cyber Security: NDR Meets XDR

Network Detection and Response and Extended Detection and Response have a synergy that leads to stronger cyber defenses.

2023-06-26

How Does Your Board Measure Cyber Resilience?

Adopting A Prevention-First Approach: Going beyond traditional cybersecurity measures means prioritising resilience. By Deryck Mitchelson

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Wizard Computing

Wizard Computing

Wizard Computer Services is a full service IT solutions provider that offers managed services, consultation, installation, and support to small and large businesses in New England.

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Datto

Datto

Datto delivers a single toolbox of easy to use products and services designed specifically for managed service providers and the businesses they serve.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

ShiftLeft

ShiftLeft

ShiftLeft is a continuous application security platform, purpose-built for the modern software development life cycle.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.

Ncontracts

Ncontracts

Our mission at Ncontracts is to continually improve our clients’ ability to manage risk and compliance.