FREE TO VIEW


« Back to News

2023-03-03

Big British High Street Retailer Attacked

Staff Data Stolen: WH Smith does not say how many of its 10,000-plus current and former employees have been affected by the breach.

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

The Virtual & Real Cybersecurity Threats In The Metaverse 

Virtual World: The future of the metaverse as a usable interactive environment is doomed if we fail to properly secure it. By Spencer Starkey

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-03-01

Webinar: Firewall-as-a-service (FWaaS)

Discover the benefits of firewall-as-a-service (FWaaS) in a secure access service edge (SASE) model: WATCH NOW

2023-03-03

Digital ID Cards For Everyone In Britain

Sir Tony Blair and Lord Hague are recommending adoption of universal ID cards in an effort to use technology to transform the British economy.

2023-03-02

An Apocalyptic Cyber Event

Warning: The World Economic Forum Global Security Outlook Report 2023 predicts a “catastrophic cyber event" is on the way in the "near future".

2023-03-01

Calculating The Ransom Demand On The Victim’s Insurance

Informed Extortion: The ransomware group HardBit offers to set its ransom demands in relation to the victim organisation's insurance cover.

2023-02-28

Hackers Have Stolen GoDaddy's Source Code

GoDaddy has revealed that hackers gained access to its servers to install malware, with the potential to extort many of its hosting customers.

2023-03-10

Artificial Intelligence Today - How AI Works

Artificial Intelligence is becoming the main component of important emerging technologies like Big Data, Robotics and the Internet of Things.

2023-02-27

Australia’s Victoria Leads On National Cyber Strategy

Centre Of Excellence: Victoria is Australia’s leading cyber security hub, with a thriving tech base that is developing global security solutions.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

AKS IT Services

AKS IT Services

AKS IT Services (an ISO 9001:2015 and ISO 27001:2013 certified company) is a leading IT Security Services and Solutions provider.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

SecureWorx

SecureWorx

SecureWorx are a secure multi-cloud MSP, a provider of advanced IT security services and an independent cyber security advisory.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

Wavex Technology

Wavex Technology

Wavex Technology is an award winning IT Services firm offering clients a secure and fully managed IT service.

Evanssion

Evanssion

Evanssion is a value added distributor specialized in Cloud Native & Cyber Security across Middle East & Africa.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

FutureRange

FutureRange

Specialising in IT Managed Services, Cybersecurity and Digital Transformation, FutureRange experts provide professional IT services for clients throughout Ireland and beyond.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.