FREE TO VIEW


« Back to News

2023-03-30

The Most Important Technology Advance In Decades

Bill Gates says Artificial Intelligence is as fundamental as the creation of the microprocessor, the PC, the Internet and the mobile phone.

2023-03-30

Bitbucket Backup Methods

What if you lose access to your crucial Bitbucket data? It can lead to business disruption, and more or less significant data loss.

2023-03-29

Cyber Security Budgets Are Misspent

Over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.

2023-03-29

World Backup Day 

Securing DevOps: Don't neglect to backup the types of data that are often overlooked, but the loss of which can lead to serious consequences.

2023-03-28

ChatGPT Language Model Risks

AI chatbots and Large Language Models (LLMs) present a rising security threat, the British National Cyber Security Agency has warned.

2023-03-28

Russia's Disinformation Campaign Targets Ukraine's Supporters

More than sixty 'lookalike' fake news websites set up to pass off as legitimate Western newspapers used to deliver fake news on social media.

2023-03-28

TikTok’s CEO Interrogated Over Data Privacy

The short-form video app TikTok has many millions of US users, raising suspicion that their data could be accessed by the Chinese government. 

2023-03-27

NCSC Launches Services For Small Firms To Be Safe Online

Equipping small firms with the right tools and tailor-made guidance, enabling them to be more cyber resilient and in turn reduce real world costs.

2023-04-01

Simplifying Workflows With Centralized Tools & Automation    

From Mundane To Marvellous: A cohesive ecosystem of sysadmin tools that work seamlessly together, rather than a clutter of stand-alone tools.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

2023-03-27

Ferrari Hacked & Ransom Demanded

The famous Italian sports car maker Ferrari has said it has been a victim of a cyber attack that targeted confidential customer information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ACME Communications

ACME Communications

ACME Communications specialises in the field of data centre, implementation, maintenance & operation and all aspects of other IT service.

European Business Reliance Centre (EBRC)

European Business Reliance Centre (EBRC)

EBRC is a leader in integrated Data Center, Cloud and Managed Services and a Centre of Excellence in Europe in the Management of Sensitive Information.

Swiss Cyber Think Tank (SCTT)

Swiss Cyber Think Tank (SCTT)

The Swiss Cyber Think Tank is a business network for Cyber Risk & Insurability, providing an industry-wide networking platform for insurers, technology and security firms.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Mendoza Ventures

Mendoza Ventures

Mendoza Ventures is a venture capital fund focusing on pre-seed Artificial Intelligence (AI), Fintech, and Cybersecurity startups.

Automox

Automox

Remediate vulnerabilities 30X faster than the industry norm – and dramatically reduce your risk with simple, fast, and cloud-native endpoint hardening from Automox.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

Gluu

Gluu

Modern Authentication for Digital Enterprise. Organizations around the world trust Gluu for large-scale, high-security identity & access management.

Alias

Alias

Alias (formerly Alias Forensics) provide penetration testing, vulnerability assessments, incident response and security consulting services.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Corona IT Solutions

Corona IT Solutions

At Corona IT Solutions, our team of specialists in networking, wireless and VoIP are dedicated to providing proactive monitoring and management of your IT systems.

Finite State

Finite State

Finite State enables product security teams to protect the devices we rely on every day through market-leading software threat, vulnerability, and risk management.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Maltiverse

Maltiverse

Maltiverse is a threat intelligence platform that provides security teams with high-fidelity threat data and malicious IOCs to enhance detection and response.

AXGATE

AXGATE

AXGATE is a specialized security solutions company based on our distinctive technological capabilities in the field of network information protection.