FREE TO VIEW


« Back to News

2024-09-02

The Rise Of SD-WAN And Its Implications For Security & Performance

Navigating The Future Of Networking: The deployment of SD-WAN should go hand in hand with increased cyber surveillance. By John Diamond

2024-09-02

Standards: The Key To Building A Sustainable Quantum-Safe Future 

Quantum computing has the potential to address some urgent problems, while simultaneously risking security infrastructure. By Issam Toufik

2024-09-02

X Blocked In Brazil By Supreme Court Order

Around 20 million X users in Brazil face a $9,000 daily fine for accessing Elon Musk's social media platform in a dispute over alleged censorship.

2024-09-02

Telegram CEO Under Criminal Investigation In France

Update: Suspected offenses include complicity in illegal gang transactions, money-laundering and unauthorised provision of encryption.

2024-08-27

PDF Merging Guide: Simplify Document Management

PDF merging enhances document workflows and organization for business and personal use, with practical steps for combining files efficiently.

2024-08-30

Understanding Social Engineering Attack Methods 

Social Engineering Targets Human Vulnerabilities: Deceiving unsuspecting users into dropping their security & giving up sensitive information.

2024-08-28

For Many Businesses Experiencing MultiCloud Data Breach, Multi-Cloud Security Could Be The Answer

There are common challenges associated with securing multi-cloud environments and multi-cloud security can help prevent these breaches.

2024-08-29

The NIS2 Directive Will Impact The Security Ecosystem Across The EU

NIS2: Protecting networks and information systems through proactive measures and responding quickly when under a cyberattack. By Jos Beernink

2024-08-29

Mobile & On-Line Banking Cyber Security [extract]

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-29

Iranian Hackers Target Israeli Citizens

Hackers though to be connected to the government of Iran have stepped up phishing attacks targeting high-profile individuals in Israel.

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

Nexthink

Nexthink

Using our solution, hundreds of IT departments effectively balance offering a productive and enjoyable end-user experience with making the right decisions to secure and transform the digital workplace

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

SECURITI.ai

SECURITI.ai

SECURITI.ai's PrivacyOps platform is a full-stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface.

Cranfield University

Cranfield University

Cranfield Defence and Security are at the forefront of their fields, offering capabilities ranging from cyber security and digital warfare to robotics, forensic sciences and simulation and analytics.

Swissbit

Swissbit

Swissbit AG is the leading European manufacturer of storage, security and embedded IoT solutions for demanding applications.

Zafran

Zafran

Zafran is a Risk & Mitigation Platform that defuses threat exploitation by mobilizing existing security tools.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

Brava

Brava

Brava is your trusted Business Communications and Solutions partner serving the Caribbean and Atlantic region.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm. We specialise in Risk Consulting, Security Intelligence, Geopolitical Intelligence, Cyber Security, Digital Forensics, and TSCM.