FREE TO VIEW


« Back to News

2023-05-17

Mobile Phone Chip Company Collects User’s Private Data

Leading Android chipmaker found uploading users' private data, including IP addresses to a cloud attributed to the company, without their consent.

2023-05-17

5G Renders Smart Cities More Vulnerable To Attacks

Smart Cities offer benefits like better efficiency and data-driven decision-making, but they may expose critical infrastructure and health & safety.

2023-05-16

British Banks Warn Of A Spike In Online Scams

Online Fraud: Britain's largest bank has issued an urgent warning about a new scam targeting customers affected by the cost of living crisis.

2023-05-12

The Dark Web Is A Big Cyber Security Threat

Criminal Playground: The Dark Web is used to organize and execute ransomware and DDoS attacks and to buy & sell illegally obtained sensitive data.

2023-05-10

Climate Change & Cyber Security

The Natural World & Cyber Security Are Connected: In fact, climate change could be one of the biggest security threats the planet faces.

2023-05-09

Malware Disguised As Legitimate Android Apps

Fluhorse: Malicious apps designed to extract sensitive information, including user credentials and Two-Factor Authentication codes.

2023-05-09

Insurers Must Pay Merck's $1.4B Losses For NotPetya

Court Ruling: Merck's insurers can't use an "act of war" clause to deny the pharmaceutical firm's claim for the cleanup costs after NotPetya attack.

2023-05-09

Challenges For CTOs In 2023

Being a CTO in 2023 has to be recognised as one of the most demanding yet fulfilling executive roles on the Board. By Chris Carreiro

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

2023-05-05

Phishing Attacks Surge As Cyber Criminals Exploit New AI Tools

Beating 2FA: AI tools can help threat actors craft convincing phishing messages that are devoid of some typical indicators of a phishing attempt. 

2023-05-03

Retrofixing The Remote Workforce

Combining technologies over a single platform can provide a cohesive security solution that can monitor endpoints & network access. By Tim Wallen

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

Cyber Secure Forum

Cyber Secure Forum

The Cyber Secure Forum is a premier cybersecurity event dedicated to bringing together experts, and professionals to explore the latest trends, share knowledge, and discuss strategies.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

Hague Security Delta (HSD)

Hague Security Delta (HSD)

The Hague Security Delta Campus is home of the leading cyber security cluster in Europe with an Innovation Centre, labs and training facilities.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Intel

Intel

Intel products are engineered with built-in security technologies to help protect potential attack surfaces.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

Factmata

Factmata

Factmata is an social and news media monitoring and analytics product that uses AI to identify and track narratives online, highlighting those most likely to cause brand harm or misinform the public.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Spec

Spec

Spec is the only no-code orchestration platform that protects enterprise fraud defenses from being blocked, bypassed, and manipulated by modern attack tactics.

Operational Systems (OpSys)

Operational Systems (OpSys)

OpSys is a leading Managed IT and Cyber Security provider protecting the critical elements of businesses across the globe.

C5 Technology

C5 Technology

C5 Technology specialises in the provision of networking, security, and infrastructure services to enterprises and government agencies.

Blue Networks & Infrastructure (BNI)

Blue Networks & Infrastructure (BNI)

Blue Networks and Infrastructure (BNI) is an innovative systems integrator and managed services provider.