FREE TO VIEW


« Back to News

2021-12-07

Twitter Takes-Down Thousands Of Propaganda Accounts

Twitter has removed 3,465 state-backed accounts in an effort to limit the influence of manipulation and disinformation operations on the platform.

2021-12-07

Multiple Location Supermarket Suffers Supply Chain Attack

Total IT Outage: 300 Spar convenience stores in the UK have been knocked offline, unable to process card payments as their IT supplier is attacked.

2021-12-07

Cyber Attacks Should Be The #1 Concern For Business Leaders

Prevention Is The Priority: Over 80% of board directors surveyed identified cyber attacks as the biggest threat that their business currently faces.

2021-12-07

A Short Guide To Building Cloud-Based SaaS Applications

Cloud based SaaS apps have many advantages: they are cost-effective, reliable, update automatically & have a high level of security. By Kate Harrison.

2021-12-06

NSO Spyware Used To Hack The State Department

NSO Group’s spyware has been used by an unknown assailant to hack the mobile phones of at least nine United States State Department employees.

2021-12-06

Panama Boosts Maritime Cyber Security

Panama, the world's largest merchant shipping state, is working to improve the cyber security & safety of the many maritime vessels that fly its flag.

2021-12-06

What Every PHP Developer Needs to Know About Cyber Security

PHP is the most common programme language and it's essential for web developers to have good cyber security skills to protect users. By Colin Rooney 

2021-12-02

Dealing With Scam Emails

A False Sense Of Security: What to do if you receive a suspicious message that looks like its from your corporate email address. By Eliza Sadler

2021-12-02

What Is An API, Anyway?

AN API is the acronym for a software intermediary that allows two applications to talk to each other - which is is a very important security feature.

2021-12-02

Clearview Faces £17 Million Penalty For Breaching Data Laws

The data of a substantial number of Britons may have been scraped from social media platforms and other online sources without consent.

2021-12-01

British Spies Must Adapt to Survive

Britain's secret spy agency will have to become “more open to stay secret” and work with tech companies to counter threats from China and Russia.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

FIRST Conference

FIRST Conference

Annual conference organised by the Forum of Incident Response and Security Teams (FIRST), a recognized global leader in computer incident response.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

herdProtect

herdProtect

herdProtect is a second line of defense malware scanning platform powered by 68 anti-malware engines in the cloud.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

AdaptiveMobile Security

AdaptiveMobile Security

AdaptiveMobile Security, a world leader in mobile network security, protecting more than 2.2 billion subscribers worldwide.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

ResponSight

ResponSight

ResponSight is a data science company focusing specifically on the challenge of measuring risk and identifying changes in enterprise/corporate networks using behavioural analytics.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Hunton Andrews Kurth

Hunton Andrews Kurth

Hunton Andrews Kurth LLP serves clients across a broad range of complex transactional, litigation and regulatory matters. Practice areas include Privacy and Cybersecurity.

Securin

Securin

Securin offers a comprehensive portfolio of solutions including Attack Surface Management, Vulnerability Intelligence, Penetration Testing, and Vulnerability Management.

Trustack

Trustack

Trustack services cover connectivity, infrastructure services, security, unified comms, agile working and more. Our team of consultants deliver customised solutions tailored to your needs.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

Cyvore Security

Cyvore Security

Cyvore combines cutting-edge AI, machine learning, and behavioral analytics to detect, investigate, and neutralize threats before they compromise your organization.