FREE TO VIEW


« Back to News

2025-04-14

North Korean Hackers For Hire

By pretending to be legitimate remote workers to get jobs in US and EU companies, nation-state hackers aim to carry out financial fraud and IP theft.

2025-04-11

Do You Need Security That Starts With “Prove It”?

Deciding Between A Software-Defined Perimeter And A VPN: Both aim to secure remote access, by quite different routes. By Don Boxley

2025-04-10

Australia's Largest Pension Funds Under A Co-Ordinated Attack

AU$850m At Risk: The Association of Superannuation Funds of Australia says that hackers have attacked several of the major fund managers.

2025-04-11

Former CISA Director Accused Of 'Bad Faith'

President Trump has revoked any active security clearances held by ex-CISA Director, Chris Krebs, ordering the US Attorney General to investigate.

2025-04-11

The Leading Russian Cyber Security Companies [extract]

Russia is strengthening its national cyber defences by requiring commercial organisations to connect to a unified cyber security system.

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-04-09

On Trend With Zero-Trust Architecture & Multi-Cloud Environments

Security management is shifting, with changes in cloud platform adoption, deployment of firewalls and Software-Defined Wide Area Networks.

2025-04-07

Britain Is Unprepared To Defend Itself From Nation-State Hackers

The rising sophistication of cyber attacks and state-backed incidents has exposed many vulnerabilities within UK public sector organisations.

2025-04-09

Britain Falls Under Pressure To Relax Regulations On AI

The British government is warned to relax copyright laws and to allow Artificial Intelligence firms build new products in a less restricted way.

2025-04-09

CYRIN's New Lab - The Fundamentals of Cryptography

A New CYRIN Lab: Students are introduced to cryptography, the process of hiding or encoding messages so only intended recipients can read them.

2025-04-04

Staying Secure, Skilled & Sustainable

The IT Balancing Act: Three key areas are shaping the IT industry - Cybersecurity, AI & Cloud adoption, and Sustainability. By Martin Hodgson

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

MindPoint Group (MPG)

MindPoint Group (MPG)

MindPoint Group is a specialist Information Security Consulting firm.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

Point Predictive

Point Predictive

Point Predictive build Predictive Models using Artificial Intelligence and Machine Learning techniques that help our customers stop fraud and early payment default (EPD).

Valence Security

Valence Security

Valence manages and secures your Business Application Mesh by delivering visibility, reducing unauthorized access and preventing data loss.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

Custodia Continuity

Custodia Continuity

Custodia Continuity manage your Security, Backup, Continuity and Compliance. You get on with your business.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

Centum Digital

Centum Digital

Centum Digital provide services, products and solutions specialized in communications engineering, control and signal intelligence.

CodeShield

CodeShield

CodeShield is a SaaS that helps software developers and security teams secure IAM in the public cloud. With us, you detect IAM privilege escalations easily and achieve least privilege.

Cure53

Cure53

Cure53 offers classic black-box penetration tests (zero-knowledge) as well as white-box tests and code audits.