FREE TO VIEW


« Back to News

2025-06-23

Ransomware Trends In May 2025

A Persistent Plague: 31% of attacked enterprises halt operations, 40% downsize staff, and 60% of SMEs close within six months.

2025-06-24

How Retailers Can Combat The Rising Cyberthreat

Retail Under Siege: Industry experts give their valuable insights on resilience & recovery in the wake of the recent attacks on high-profile brands.

2025-06-24

The Corporate Risk Of Deepfake Deception

When Seeing Isn't Believing: Businesses face a sharp learning curve – one that spans technology, training & organizational culture. By Neil Weller

2025-06-20

The UK’s Defence Shift & The Urgency Of Sovereign Digital Infrastructure

Rethinking The Stack: Resilience today is not just about redundancy. It is about ownership of code, protocols, and platforms. By Matthew Hodgson

2025-06-21

Israel-Iran Conflict Escalates With Surging Cyber Attacks & Disinformation

Cyberspace Remains A Key Battlefield: Patriotic hacktivists, online propagandists and opportunistic cybercriminals are piling in to the cyberwar.

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

2025-06-20

Cybersecurity Has Become Britain's Top Defence Priority

Cybersecurity Is Not Just A Technical Issue: To stay ahead means investing in smarter, faster, & more autonomous defences. By Dan Jones

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-05

Police Shut Down A Criminal Malware Operation

EU & US police have taken down AVCheck, a powerful cyber crime system used by hackers to test if security tools could detect their malware.

2025-06-23

Japan's 'Active Cyber Defence' Strategy

Pre-Emptive Defence: Japan is creating a new cyber security strategy to monitor external telecommunications & quickly respond to impending attacks.

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

National Defense Industry Association (NDIA) - USA

National Defense Industry Association (NDIA) - USA

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Verint Systems

Verint Systems

Verint is a leader in CX automation. The world’s most iconic brands rely on our open platform and team of AI-powered bots to create tangible AI business outcomes, now.

A-LIGN

A-LIGN

A-LIGN is a technology-enabled security and compliance partner trusted by more than 2,500 global organizations to mitigate cybersecurity risks.

Kratikal

Kratikal

Kratikal provides a complete suite of manual and automated security testing services.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

SecureLogix

SecureLogix

SecureLogix deliver a unified voice network security and call verification solution. Protect against call attacks & fraud.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyberi

Cyberi

Cyberi provide specialist technical consultancy and cyber advisory services, from penetration testing and assurance to incident management and response, and technical security research.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Sekoia.io

Sekoia.io

Sekoia.io is a European cybersecurity company whose mission is to develop the best protection capabilities against cyber-attacks.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

ThreatER

ThreatER

ThreateER (formerly ThreatBlockr / Bandura Cyber) is a cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.