FREE TO VIEW


« Back to News

2022-10-05

Lessons From The Cyber Front Line

20:20 Hindsight: Some of the highest profile cyber attacks & breaches offer clear pointers on how to avoid similar attacks. By Nigel Thorpe

2022-09-30

Why Companies Need A Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

2022-09-27

Securing The Future Of Open Finance

Financial-Grade Security: The adoption of Open Banking raises critical cyber security concerns over outdated systems. By Jacob Ideskog

2022-09-27

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure

Square Peg In A Round Hole: The operating technology behind Industrial Control Systems & devices is a mystery to IT professionals. By Joe Weiss 

2022-09-23

Quantum Computing Raises As Many Problems As It Solves

Quantum computing poses both opportunities and risks to the cyber security environment and above all, a serious threat to encrypted communications.

2022-09-22

Even Air-Gapped Computers Are Vulnerable To Attack

LaserShark: Computer systems that are physically isolated from the outside world (air-gapped) can still be attacked via optical channels.

2022-09-22

Artificial Intelligence Distorts Government Decision-Making

AI reinforces the divisions of democracy and might also confound autocratic regimes, by concealing underlying social splits with false consensus.

2022-09-21

Why Domain Protection Is A Key Pillar Of Cybersecurity

Protecting Domain Names Is Vitally Important: Homograph 'look alike' attacks are one of the major challenges in cyber security. By Brian Lonergan

2022-09-21

DARPA Wants To Play With Artificial Intelligence

Gamebreaker: DARPA wants to apply AI to existing real-time conflict strategy games to exploit every hidden and unfair advantage available.

2022-09-21

NATO Secret Missile Data Found On The Dark Web

Failed Ransom Attack: Missile maker says the stolen data was acquired from a compromised external hard drive, rather than a network breach.

2022-09-20

Dutch Town Sues Twitter For Paedophile Conspiracy

False Witness: A small Dutch town is suing Twitter over a conspiracy theory claiming it was once home to a ring of Satanic paedophiles.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IDnext

IDnext

IDnext is the open and independent platform to support innovative approaches in the world of the Digital identity.

Thinklogical

Thinklogical

Thinklogical manufactures secure, KVM, video, audio, and computer peripheral signal switching solutions for defence C4ISR applications.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Nexis

Nexis

Nexis GmbH is a German IT security company specializing in IAM, access control, and risk management.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Grypho5

Grypho5

Grypho5 offers managed packages to protect where threat actors strike most. We defend your infrastructure dynamically, leaving you to focus on other priorities.

Darwinium

Darwinium

Darwinium is a Cyberfraud Prevention Platform that provides scalable customer journey protection without complexity.

DataBee

DataBee

DataBee, a Comcast Company, brings to market an enterprise-ready security data fabric that delivers connected compliance and security data that works for everyone.