FREE TO VIEW


« Back to News

2024-11-20

AI Could Replace 3m British Jobs

AI could also follow the pattern of previous technological breakthroughs by creating activities that require workers to perform new tasks.

2024-11-14

Five Best Practices For Secure & Scalable Cloud Migration

Lift & Shift: Follow these five battle-tested best practices to ensure your cloud migration transforms capabilities, not create headaches. 

2024-11-13

Bank Blocks Staff From Using WhatsApp & Facebook Messenger

NatWest Bank has taken action to enforce rules over employees' use of unauthorised messaging services, in a move to avoid heavy fines.

2024-11-13

Network Pen Testing Is A Cybersecurity Secret Weapon

Here’s How To Use It: Six reasons why pen testing should be a regular part of an organization’s security strategy. By Alton Johnson

2024-11-12

Fancy Bear At Work

Confirm You Are Not A Robot: A phishing campaign using emails that deliver a link which appears to be a Google reCAPTCHA bot-detection dialog.

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-12

Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity

Its increasing use for sophisticated phishing emails and deep fake attacks makes AI security more important than ever. By Srikrishna Shankavaram

2024-11-11

The Human Impact Of Ransomware In Healthcare

Urgent action is needed to combat the cybersecurity trade-off which is putting patient’s health and wellbeing at risk. By Darren Williams

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-11-11

Ai-Da - The Robot Artist

Portrait Of Alan Turing: A painting by an AI robot of the eminent World War Two codebreaker mathematician has been sold for over $1m.

2024-11-11

Hackers Target Sensitive Corporate Data 

40GB Of Data Stolen: The French multinational energy & automation company Schneider Electric has suffered a severe attack.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NCX Group

NCX Group

NCX Group is committed to helping customers identify and mitigate the risks inherent in today’s interconnected environments and business processes.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

PatrOwl

PatrOwl

Automate your SecOps with PatrOwl, and start defending your assets efficiently.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Incognia

Incognia

Incognia have created a ubiquitous private identity based on location behavior, that enables a personalized frictionless experience with mobile apps and connected devices.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.

A&O Shearman

A&O Shearman

A&O Shearman is a law firm at the forefront of the forces changing the current of global business: energy transition, life sciences, technology, private capital, finance and beyond.