FREE TO VIEW


« Back to News

2024-06-25

Cyber Security Staff Burnout Costs Firms $600m A Year

Work-related stress, fatigue, illness and burnout are making cybersecurity professionals less productive, costing $millions.

2024-06-25

AI & Cloud Are At The Intersection Of Cyber Security

Check Point’s 2024 Cloud Security Report: Cloud threats are growing with increasing concerns over emerging risks & zero-day attacks.

2024-06-25

The Psychology Of GenAI Manipulation

A Deep Dive Into Human Tactics: GenAI bots can be tricked into divulging sensitive information, placing organisations at risk. By John Blythe

2024-06-24

Large - Scale Supply Chain Hack On Auto Industry

Hackers who disabled the software systems of a company that provides services to thousands of US car dealerships are demanding ransom.

2024-06-24

Leveraging The Benefits Of LLM Securely 

Holistic protection across the cloud native application lifecycle will enable business to embrace the full potential of GenAI. By Gilad Elyashar

2024-06-24

US Blocks Leading Cybersecurity Firm Kaspersky

Three Month Deadline: Kaspersky will no longer be able to sell it’s software or provide updates to software already in use by US customers.

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

2024-06-24

Five Reasons Your Organization Needs API Security Testing

API security testing is a key component in safeguarding digital assets, ensuring the integrity & confidentiality of data transmitted across systems.

2024-06-21

Hackers Publish Stolen Blood Test Data From London Hospitals

The group behind the recent Snynnovis attack that is disrupting operations at several major hospitals in London has published stolen data online.

2024-06-20

Industrial Operating Technology Faces An Urgent Challenge

Major cybersecurity agencies have issued an “urgent warning” on industrial cybersecurity - and how organisations can heed it. By Edgardo Moreno

2024-06-19

Navigating cloud security: The importance of posture management tools

On Demand: Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Information Commissioner's Office (ICO) - UK

Information Commissioner's Office (ICO) - UK

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Oodrive

Oodrive

Oodrive is the first trusted European collaborative suite allowing users to collaborate, communicate and streamline business with transparent tools that ensure security.

OEDIV SecuSys

OEDIV SecuSys

OEDIV SecuSys (formerly iSM Secu-Sys) develops high-quality IT software solutions, setting standards as a technology leader in the area of identity and access management.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

Semmle

Semmle

Semmle's code analysis platform helps teams find zero-days and automate variant analysis. Secure your code with continuous security analysis and automated code review.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.

DarkHorse Security

DarkHorse Security

DarkHorse exists to make it easy and affordable for organizations to be able to identify their cybersecurity vulnerabilities.