FREE TO VIEW


« Back to News

2022-09-12

Cyber Crime Against Individuals [extract]

It's Personal: Cyber crime continues to rise in scale and complexity, affecting essential services & businesses, as well as many private individuals.

2023-11-30

Cyber Security Trends For 2024 [extract]

Cybercrime is predicted to cost the global economy $8 trillion USD in 2023. By the end of 2024 the anticipated cost will be $10.5 trillion.

2024-08-07

Google’s Online Search Dominance Is Ruled Illegal

Online Search Monopoly: US Federal court rules that payments to make Google the default search engine on other browsers broke antitrust rules.

2024-08-07

KnowBe4 Duped Into Hiring A North Korean Hacker

Laptop Mule Farm Espionage: North Korean threat actors attempt to penetrate US organisations by posing as remote IT workers. 

2024-06-20

Artificial Intelligence Is Changing Education [extract]

The widespread introduction of  AI has taken only a few months for Generative AI and ChatGPT to change education.

2024-01-22

Open Banking, Security, APIs & Mobile Apps [extract]

Open banking aims to improve transparency and drive the development of better financial products & services. But are users' sensitive data secure?

2024-02-24

Defending Against These Common Types Of Cyber Attack [extract]

Cyber crime will cost the global economy approximately $10.5 trillion annually by 2025. What, then, are the most common types of cyber attack?

2024-04-15

A Brief Introduction To Quantum Computing [extract]

Quantum Computing: Innovative technology is enabling individuals and companies to solve computational problems previously considered intractable.

2024-04-18

Problems With Underperforming Cyber Security Service Providers [extract]

The Risks Of Reliance On Service Providers: It is increasingly hard for companies to disconnect from the digitised supply chain ecosystem.

2024-08-06

Google Says Websites Must Comply With New Security Rules

Google has lost confidence in Entrust and will soon no longer accept Digital Certificates from one of the most widely used certification authorities.

2024-08-06

Modern Britain: Disinformation On Social Media Inflames Anti-Immigration Riots

Algorithms sending fake news across social media have generated a chain reaction of anger leading to riots, following the murder of three children.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Momentum Cyber

Momentum Cyber

Momentum Cyber provides world-class M&A and strategic advice combined with unparalleled senior-level access to the Cybersecurity ecosystem.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange (CQE)

Chicago Quantum Exchange is an intellectual hub and community of researchers with the common goal of advancing academic and industrial efforts in the science and engineering of quantum information.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.

AmiViz

AmiViz

AmiViz is the first B2B enterprise marketplace focussed on Cybersecurity business in the Middle East and Africa, designed specially to serve the interests of enterprise resellers and vendors.

TeamSystem

TeamSystem

TeamSystem is a leading tech company in the market for digital business management solutions for companies and professionals.

HCLTech

HCLTech

HCLTech is a global technology company delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products.

TorchLight

TorchLight

TorchLight designs and manages cybersecurity that moves at the speed of opportunity to defend against business risks and illuminate the path to security.