FREE TO VIEW


« Back to News

2023-04-05

The Skills Gap Is Increasing Risk & Exposure To Attack

The effects of the skills shortage are apparent, as organisations struggle to recruit sufficient talent & maintain security levels. By Jamal Elmellas

2023-04-05

President Biden Forbids Spyware From Government Use

President Biden has approved an Executive Order that bans US government use of the type of commercial spyware used by foreign states. 

2023-04-04

TikTok Fined £12.7m For Breaching Child Protection Law

The video-sharing site used the data of 1.4 million British children aged under 13 without parental consent, resulting in a punitive fine.

2023-04-04

AI Revolution: The Future Is Here, Now

Artificial intelligence will change our lives, in ways both good and bad. But how confident can we be that we are prepared for what's coming?

2023-04-04

Universities Are Exposing Their Students To Cyber Threats

Universities are lagging on basic cyber security measures, subjecting both students & staff to higher risks of credentials-based email fraud.

2023-04-01

Honeypot Sting Exposes British Cyber Criminals

Operation 'Power Off': Police clamp down on cyber criminals using Distributed Denial of Service tactics to target online businesses & their users.

2023-04-05

New Webinar: Next-generation Firewalls

Learn how a next-generation firewall is key to protecting organizations from evolving challenges. Register Now

2023-03-31

Imminent: Cybersecurity Regulations For US Financial Services

Don't Wait: Firms should test their vulnerability management programs, introduce a patch program and do penetration testing now. By Simon Eyre

2023-03-30

The Cybersecurity Threat To Railways

Ransomware attacks are an increasingly significant cyber threat facing the transport sector in the EU and railways are the prime target.

2023-03-31

The Inevitable Rise Of Artificial Intelligence

Technology leaders are calling for a six-month halt to training new AI systems to give the industry time to assess the risks. By Winlo & Cambolin

2023-03-31

Understanding The Incident Response Lifecycle

Best practices help organizations enhance their incident response capabilities, ensuring a more effective response to cybersecurity incidents.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

CSIRT Panama

CSIRT Panama

CSIRT Panama is the national Computer Incident Response Team for Panama.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Redstor

Redstor

Redstor's complete data management helps you discover, manage and control your data from a single control centre, unifying backup and recovery, disaster recovery, archiving and search and insight.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Blockchain R&D Hub

Blockchain R&D Hub

Blockchain R&D Hub's mission is to serve the needs of blockchain ecosystem as the center of excellence for technology research and development.

Hazy

Hazy

Hazy specialises in financial services, helping some of the world’s top banks and insurance companies reduce compliance risk.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Gatefy

Gatefy

Getfy is a cybersecurity company specialized in artificial intelligence and machine learning. We work to solve challenging issues, especially those involving email security.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

Kolide

Kolide

Kolide ensures that if a device isn't secure, it can't access your apps.