FREE TO VIEW


« Back to News

2024-07-30

The UK Needs To Move Faster On Nuclear Energy Cybersecurity

Britain's nuclear industry has languished. The new Labour government plans to revive it, but cybersecurity needs bolstering. By Dr Marion Messmer

2024-07-30

Overcoming Obstacles To Zero Trust Adoption

Breaking Barriers: The case for adoption is compelling. So, what is holding organisations back from embracing Zero Trust? By Samantha Mabey

2024-07-29

Olympic Sponsors Are Prime Targets For Hackers

Those at risk need to be vigilant against cyber attacks such as ransomware, identity management breaches and physical attacks on hardware.

2024-07-29

Video Game Actors Fear Being Replace By AI 

Actors are worried about gaming producers using GenAI to reproduce their voices and physical appearance without fair compensation.

2024-07-29

Ghost Accounts Spreading Malware On GitHub

Stargazers Ghost Network: A sophisticated DaaS system that distributes malware and malicious links via an estimated 3,000 GitHub ghost accounts. 

2024-07-26

Most Wanted - North Korean Hackers 

$10m Reward: Information leading to the location of Rim Jong Hyok, known to be associated with the Andariel state-sponsored hacking group.

2024-07-26

CrowdStrike’s Cyber Outage Will Cost $Billions

With regulatory penalties and many costly lawsuits in preparation, CrowdStrike's investors face $billions in fines, legal fees and lost revenue. 

2024-07-26

Wiz Rejects Google's $23b Acquisition Offer

Wiz has decided not to go forward with an unprecedented deal to be acquired by Google's parent and will remain an independent company.

2024-07-26

How Small Businesses Can Develop Cyber Resilience

To stay competitive, small businesses need to strengthen cyber resilience, secure their customer data & protect their IT systems. By Jochen Haller

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-25

Israel-Hamas Conflict: The Escalation Of Cyberwarfare

Malware, Hacktivism & Disinformation: The ramifications of the Middle East cyberwar will impact organizations around the world. By Craig Watt

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

CloudOak

CloudOak

CloudOak is a cloud channel provider for hybrid cloud Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS) and Archiving to Small to Medium Business (SMB).

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Fortified Health Security

Fortified Health Security

Fortified’s team of cybersecurity specialists is dedicated to helping healthcare providers, payers and business associates protect their patient data across the Fortified Healthcare Ecosystem.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.