FREE TO VIEW


« Back to News

2022-07-20

A New Era of Ransomware

Governments can learn from recent attacks in Costa Rica how they can protect themselves from future ransomware threats. By Deryck Mitchelson

2022-07-19

Iranian Hackers Try Intercepting Israeli & US Government Emails

Detected: A string of phishing attempts by hackers who targeted envoys, politicians, defense officials, academics and business executives.

2022-07-19

Ransomware Is Driving Cyber Security Professionals To Consider Quitting

Persistent ransomware threats and looming, large-scale attacks are pushing some security professionals towards leaving their chosen career. 

2022-07-18

What To Look For In A Cyber Essentials Assessment Partner

The NCSC Cyber Essentials schemes have been updated. Take this opportunity to make sure you ace the new assessment. By Steve Whiter

2022-07-18

Cyber Security In Fintech

Top 5 tips to enhance cyber security in fintech companies where extraordinary cyber attacks are encountered on a day-to-day basis. By Ryan Jason

2022-07-18

Apple Will Block Spyware Attacks

Lockdown Mode: Apple has announced that it will introduce a new security feature on all iOS devices to protect high-risk users against spyware.

2022-07-18

Conversational Commerce Is Going To Be Big - But Could Be Risky

Cyber security threats are emerging as more people are using mobile messaging platforms to shop & contact customer services. By Dario Betti

2022-07-15

Suspicions That Explosion At US Gas Export Terminal Caused By Russian Hackers

Was the Freeport Liquified Natural Gas explosion that forced Europe to keep buying Russian gas a Control System cyber attack? By Joe Weiss

2022-07-12

Creating A Security Awareness Training Program

Are you responsible for the information assets of your organization? Then you need an effective security awareness training program. By Stacie Orlandi

2022-07-13

N.Korean Hackers Target US Health Providers With Ransomware

CISA Points The Finger: The US security agency recommends that companies in the healthcare industry take a zero-trust, identity first approach.

2022-07-13

Exposed: Sensitive Data Of 146,000 Aon Customers

The commercial insurance giant, Aon, calls itself the 'go-to cyber response team.' But hackers breached its systems for well over a year.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Dynamic Quest

Dynamic Quest

Dynamic Quest is a managed IT, cloud and security services companies, providing a comprehensive range of technology services including cybersecurity, backup and disaster recovery.

BOXX Insurance

BOXX Insurance

BOXX Insurance Inc. is a new type of insurance company for a new type of risk. Cyberboxx is the first fully-integrated cybersecurity and insurance solution for small-to-medium-sized businesses.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.

Norwegian Data Protection Authority (Datatilsynet)

Norwegian Data Protection Authority (Datatilsynet)

The Norwegian Data Protection Authority (Datatilsynet) is the national data protection authority for Norway.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.