FREE TO VIEW


« Back to News

2025-06-04

FBI Warns Of Surging Use Of Vishing

AI-Generated Voice Messages: The FBI has issued a warning about a big increase in malicious scams using fake text & voice messaging.

2025-06-16

Understanding Identity & Access Management

The Front Door Of Cyber Defence: IAM is becoming the essential first line of defence against cyberattacks targeting identities. By Sidra Mobeen

2025-06-02

Scattered Spider Hackers Get Busy

Scattered Spider Targeting Retailers: The cybercrime group linked to multiple high-profile retail breaches increasing its international activities.

2025-06-05

British Research & Innovation Faces Serious Cyber Attacks

Sharp Increase In Cyber Attacks On UKRI: The UK's primary science funding agency is under growing threat from sophisticated cyber espionage.

2025-05-23

New Law Bans Intimate Deepfake Images

The Take It Down Act: New US legislation aims to criminalise the distribution of AI-generated deepfakes and intimate images without consent.

2025-05-22

Major Cyber Attack On British Legal Aid Agency

British Legal Aid Data Hacked: Personal and criminal records have been compromised as sensitive data of thousands of applicants is exposed.

2025-05-22

Tesco Website & App Outage Sparks Customer Frustration

Following the damaging and costly attack on M&S, another major UK retailer faces IT disruptions affecting online shopping & customer loyalty.

2025-06-03

DORA - The Regulatory Awakening

Identity Threat Detection & Response: Identity security can help financial services deal with the challenges of DORA compliance. By Mo Joueid

2025-05-23

Large-Scale Data Exposure Discovered

Infostealer Malware: Research has uncovered a massive breach affecting 184 million records & accounts in a publicly accessed database.

2025-05-21

Pegasus Spyware Maker Fined

For the first time, a developer of spyware has been held responsible for exploiting vulnerabilities in smartphone platforms.

2025-06-09

The Email Security Threats Businesses Can’t Ignore

Caution: Simple mistakes like sending an email to the wrong person or attaching the wrong file can lead to serious data breaches. By Rick Goud

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Kaseya

Kaseya

Kaseya is a premier provider of unified IT management and security software for managed service providers (MSPs) and small to medium-sized businesses (SMBS).

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Calero Software

Calero Software

Calero is a leading global provider of Communications and Cloud Lifecycle Management (CLM) solutions designed to simplify the management of voice, mobile and other unified communications services.

Digital Pathways

Digital Pathways

Digital Pathways is an award-winning data security provider that helps businesses protect their digital assets.

Ampyx Cyber

Ampyx Cyber

Ampyx Cyber (formerly Ampere Industrial Security) is an industrial security firm. We specialize in industrial control systems (ICS) and operational technology (OT) security.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

BlockSec

BlockSec

BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top security researchers and experiencedexperts from both academia and industry.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

CertX

CertX

CertX is a Swiss functional safety, cybersecurity and artificial intelligence certification body.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.