FREE TO VIEW


« Back to News

2021-12-15

Stolen: Personal Details Of 80k Australian Government Employees

Over 80,000 South Australian government workers had their private data stolen in a ransomware attack & their employer is getting the blame.

2021-12-14

Keeping Women Safe On British Streets

WalkSafe: Women feel less safe when walking alone after dark and now there is a real time SatNav tracking App available to give reassurance.

2021-12-14

Volvo Falls Victim To Hackers

Hackers have stolen an undisclosed amount of research and development data from car maker Volvo, in what might be a possible ransom attack.

2021-12-13

Israel & Iran Locked In Cyber Conflict

The shadow war between Israel and Iran is increasingly being fought in cyberspace and civilians are the latest targets in this long-running conflict.

2021-12-31

Best Programming Languages For Cyber Security In 2022

Knowing a programming language can help individuals know where vulnerabilities in software may exist as well as how to overcome them.

2021-12-13

Critical Fault with Log4j Software

Alert: Attackers are exploiting a critical vulnerability in Apache Log4j, a logging library that's used in millions of Java-based applications.

2021-12-10

Britain's New Deals On Digital Trade & Cyber Security

Britain has entered separate new long term cyber security arrangements with Israel and Singapore to frame new technology & future digital standards.

2021-12-10

Boris Johnson's Cabinet Office Fined £500k For Leaking Data

The British Government department responsible for supporting Prime Minister Boris Johnson pays the penalty for breaking GDPR rules.

2021-12-31

Cyber Security In 2022

Strategic & Tactical predictions for the digital ecosystem, which faces even more challenges & numerous sophisticated threats in 2022. By Chuck Brooks

2021-12-08

How Good Is Your Resilience Testing?

Backup: Any resilience measure must be tested on a regular basis, and not just when the ‘stuff’ has hit the fan. By Colin Tankard

2021-12-08

Amazon Cloud Outage Affects Major Customers

The extent to which major companies in retail, media, logistics, financial & other critical services rely on the outsourced cloud provider is exposed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Quaynote Communications

Quaynote Communications

Quaynote Communications is a specialist conference and communications company focused primarily on the maritime, yachting, aviation and security industries.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Zemana

Zemana

Zemana provides innovative cyber-security solutions to deal with complex malicious software and other cyber threats.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.

SteelGate

SteelGate

SteelGate’s core capabilities are centered around architecture design and engineering of network, systems, and cybersecurity solutions.