FREE TO VIEW


« Back to News

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-13

Outsourcing Production Risks Productivity

An IT department often needs to find a quick solution when a large number of users are impacted by an operational emergency. By Matt Lorentzen

2024-02-13

The US Makes Robocalls Illegal

With major national elections pending in the major democracies around the world, the US FCC regulator has outlawed AI-generated phone calls.

2024-02-13

Chinese Hackers Operated Undetected In Critical US Networks

The Chinese state-sponsored hacking group Volt Typhoon has been embedded in critical US infrastructure networks for at least five years.

2024-02-13

DDoS Attacks In Poland Have Spiked As New Government Takes Office

Damaging Hacktivist Activity: Politically motivated DDoS attacks on public services across several critical sectors have spiked following elections.

2024-02-12

Imran Khan Claims Victory Using AI Generated Video

Pakistan Election Turmoil: The imprisoned political leader appeared on an AI generated video to claim virtual victory following an Internet shutdown.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

2024-02-09

Pakistan Mobile Internet Is Cut Off On Election Day

Law & Order: Pakistan's government has shut down mobile calls and data services as millions of people go to the polls to vote for a new government.

2024-02-09

Chinese Hacking Campaign Targets US Critical Infrastructure

Widespread Offensive Cyber Operations: Chinese hackers are implanting malware to disrupt daily life, were the US and China ever to go to war.

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-07

Neuralink Implant A Brain Chip In A Human

A Brain - Computer Interface: Neuralink has implanted a wireless brain chip in a human for the first time aimed at restoring motor functionality.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Arcanum Information Security (AIS)

Arcanum Information Security (AIS)

Arcanum Information Security is a specialist Information Assurance Consultancy and a leading provider of Cyber Security services to UK Defence, UK Government, Enterprise businesses and SMEs.

Quorum Cyber

Quorum Cyber

Quorum Cyber offer end-to-end cyber security solutions, specialising in Managed Security Services, Consulting and Resourcing.

Ensign InfoSecurity

Ensign InfoSecurity

Ensign InfoSecurity is Southeast Asia’s largest pure-play cybersecurity firm.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Netsecurity AS

Netsecurity AS

Netsecurity is a Norwegian owned company focused and specialised within IT security and cybersecurity-as-a service.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

Enterprise Ethereum Alliance (EEA)

Enterprise Ethereum Alliance (EEA)

EEA is a member-led industry organization whose objective is to drive the use of Ethereum blockchain technology as an open-standard to empower ALL enterprises.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

BigPanda

BigPanda

BigPanda is the first provider of Autonomous Operations solutions that empower IT Operations at large, complex enterprises.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Winterhawk

Winterhawk

Winterhawk is a specialist and leading global Cyber, ESG, GRC, Risk & Identity consulting practice.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Smarsh

Smarsh

Smarsh products are designed for user-friendly, efficient compliance. From archiving, supervision, and discovery to cybersecurity – Smarsh has you covered.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.