FREE TO VIEW


« Back to News

2025-05-09

The Seven Pillars Of MLops

Machine Learning Operations: AI and ML are not just about creating models, they’re about constructing integrated solutions. By Yuval Fernbach

2025-05-07

TikTok Fined €530M For Breaking EU Rules

The Irish data regulator has fined TikTok €485m for user data transfers to China & €45m for the lack of transparency in its privacy policy. 

2025-05-13

AI-Powered Malware - A Serious Cyber Security Threat

Malware Development: AI-powered cyber attacks are more sophisticated, harder to detect & capable of by-passing traditional security measures. 

2025-05-07

Cyber Crime Cost The US $16 Billion In 2024

The FBI quantifies the cost of cyber crime against organisations & individuals as more than $16billion - an increase of 33% over the preceding year.

2025-05-06

The Vital Importance Of Semiconductors To AI & Quantum Computing [extract]

Chips With Everything: Heightened demand for more, more powerful, semiconductors is driving innovation across manufacturing supply chains.

2025-05-08

Concerted Successful Attacks On British Retailers

Update: Marks &Spencer, Harrods & the Co-op have all fallen victim to social engineering attacks, a well-established method of criminal deception.

2025-05-06

Present Danger: Cyber Attacks On Power Grids

As investigation of the widespread blackouts in Spain & Portugal continues, the Netherlands is preparing for the possibility of similar disruptions.

2025-05-02

Five Key Lessons For Building A Resilient Cyber Security Department

Building A Team: In times of crisis, UK businesses should prioritise the onboarding & training of cybersecurity professionals. By Kevin Vashi

2025-05-05

Entering the Cybersecurity Workforce: Where to Begin?

There are many options for online learning to develop foundational knowledge & gain hands-on experience. CYRIN offers assistance & support.

2025-05-05

New British Child Protection Regulations

Platforms which include pornography, or content which encourages self-harm, suicide or eating disorders must prevent children using that content.

2025-05-01

Legal Steps To Take When Facing A Cybersecurity Breach In Your Business

Quickly understanding the legal steps to take after a breach can help business owners minimize their liability and protect their customers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

Future of Cyber Security Europe

Future of Cyber Security Europe

Future of Cyber Security Europe is a European wide event examining the latest cyber security strategies and technologies.

Cybersecurity Tech Accord

Cybersecurity Tech Accord

The Cybersecurity Tech Accord promotes a safer online world by fostering collaboration among global technology companies.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Sekuro

Sekuro

Sekuro is your leading governance and cyber security partner. Building organisational resilience. Enabling fearless innovation.

Buchanan & Edwards

Buchanan & Edwards

Buchanan & Edwards delivers forward-focused technology solutions that help our clients transform the way they perform their missions.

GrayMatter

GrayMatter

GrayMatter provides Advanced Industrial Analytics, OT Cybersecurity, Digital Transformation and Automation & Control services to clients across the U.S. and Canada.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.

NetDescribe

NetDescribe

NetDescribe, part of Xantaro Group, advises and supports companies in building secure and stable IT environments.

NetSentries Technologies

NetSentries Technologies

NetSentries provide smart cybersecurity solutions and services to protect Governments, Enterprise and Individuals from threats through a comprehensive range of protocols, products and services.

Cyberscore

Cyberscore

CyberScore specialize in digital security assessments that preventively make digital environments safer against malicious attacks from inside and outside.