FREE TO VIEW


« Back to News

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-21

Maritime Cyber Attacks Are A Deadly Threat

Collisions, Deaths & Disruption: Maritime cyber security needs more investment, better regulation and widespread sharing of threat intelligence.

2023-06-21

Data Sovereignty

Cyber security is not just about IT, it is about data governance and the responsibility for that rests firmly with management. By Simon Pamplin

2023-06-20

Improving Data Security To Ensure Cybersecurity Compliance

NIS 2 Directive: Companies affected by the new directive need to demonstrate the highest levels of cybersecurity compliance. By John Michael

2023-06-20

Manufacturers Are Today's Top Target For Cyber Crime 

Security By Default: Manufacturing products & services need to implement layers of resilience to their different types of threat. By Andy Dunn

2023-06-20

Shuckworm Intensifies Cyber Attacks On Ukraine

Shuckworm is thought to be linked to the Russian FSB and has increased cyber attacks on Ukraine, hacking military & security intelligence. 

2023-06-19

Is It Possible To Trust AI Decision-Making In Cybersecurity?

AI's Use In Cybersecurity Is Still Evolving: How will this impact decision-making and can the results of its use be trusted? By Iam Waqas

2023-06-14

Nine Types of Modern Network Security Solutions

Multiple Technologies & Policies: As reliance on digital technology & data intensifies, guaranteeing effective network security is imperative.

2023-06-19

Penetration Testing Is A Vital Tool To Deal With AI-Based Attacks 

Penetration testing can indicate the best ways to defend, remediate & recover from the threat of AI-inspired and AI-powered attacks. By Ed Skoudis

2023-06-19

Mobile Authentication: The Good, The Bad & The Ugly

Mobile authentication is convenient to use and offers a sense of security, but this type of device isn’t as secure as it may seem. By Mark Bell

2023-06-19

Five Biggest Dangers Of AI For The Upcoming Years

While talking about the potential applications and benefits of artificial intelligence, it’s also important to address the dark side of the moon. 

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Morgan Lewis Law

Morgan Lewis Law

Morgan Lewis is an international law firm with offices in North America, Europe, Asia, and the Middle East. Practice areas include Privacy and Cybersecurity.

Sensible Vision

Sensible Vision

SensibleVision helps organizations transparently protect data and prevent costly security breaches by constantly verifying the identities of people who use computers or mobile devices.

Telesoft Technologies

Telesoft Technologies

Telesoft Technologies is a global provider of cyber security, telecom and government infrastructure products and services.

WWPass

WWPass

WWPass is a global cybersecurity company that provides password-less authentication and client-side encryption technology.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Digital Element

Digital Element

Digital Element is a global IP geolocation and intelligence leader with unrivaled expertise in leveraging IP address insights to deliver new value to companies.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

SixMap

SixMap

SixMap is a continuous threat exposure management platform that automatically provides comprehensive enterprise visibility, contextual threat intelligence, and a suite of remediation actions.

Garantir

Garantir

Garantir is a cybersecurity company that provides advanced cryptographic solutions to the enterprise.