FREE TO VIEW


« Back to News

2024-12-03

Artificial Intelligence Steps Into The Boardroom

Business leaders won’t be happy to use AI in the boardroom before they understand how the apparent risks are being mitigated. By Nail & Whittaker

2024-12-03

US Citizen Jailed For Cyber Espionage

A US citizen has been sentenced to jail for spying and sharing sensitive information about his employers with China's domestic intelligence agency.

2024-12-03

Iranian Hackers Are Exploiting LinkedIn

SnailResin: A fake recruitment campaign targeting LinkedIn users working in the aerospace industry used to deliver elusive malicious malware.

2024-12-03

Four Evolving Trends Every Business Leader Should Be Aware Of

Cybersecurity In 2025: Companies really need to embrace best practices & build strong foundational security policies to stay ahead. By Luke Dash

2024-12-02

Attacks On The US From China Increasing

Critical Infrastructure: Chinese cyber attacks form part of a broader strategy to disrupt US operational capabilities in the event of conflict. 

2024-12-02

Is Zero Trust The Future Of Cybersecurity?

A zero-trust architecture is especially effective for organizations that use cloud applications and have lots of remote workers and locations.

2024-12-02

AI Used For Extortion & Sexual Abuse

Paedophiles, scammers, and criminal hackers are increasingly using Artificial Intelligence to attack their victims, a senior police officer warns.

2024-12-02

2025: A New Year Of Cybersecurity Challenges

Certainty Of Cyberthreats: Leaders should cultivate a culture of vigilance, encouraging employees to beware of the unexpected. By John Mutuski

2024-11-29

How AI Is Reshaping The Cybersecurity Landscape 

ChatGPT Turns Two: Generative AI has revolutionised countless industries, including cybersecurity. A discussion with Alex Rice & Darren Thomson.

2024-11-27

Cybersecurity Essentials For Laptop Gamers

Understanding the basics of cybersecurity for laptop gamers allows you to enjoy online gaming without fear of a compromised device & stolen identity.

2024-11-29

From Credentials To Identity: Understanding Digital Identity & Access

Proactive security strategies, continuous monitoring & education are key to combat the threat of credential misuse & identity theft. By Ford Merril

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

Siscon

Siscon

Siscon delivers tailor-made compliance solutions that are based on the customer's specific wishes and reality and then supplement with many years of experience in the field.

Entel CyberSecure

Entel CyberSecure

Entel CyberSecure is a portfolio of Cybersecurity solutions and services for the protection, defense, risk management and regulatory compliance of ICT Systems for corporations and Government.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

Secure Code Warrior

Secure Code Warrior

Secure your code from the start with gamified, scalable online secure coding training for software developers.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

Omnex

Omnex

Omnex provides consulting and training services in Quality, Environmental, and Health and Safety standards-based management systems including Automotive Cybersecurity.

Mesh

Mesh

Mesh is the only email security platform built exclusively for Managed Service Providers.