NEWS > Cybersecurity News


« Back to News

2023-08-29

Undetected Attackers Could Be Inside Your IT Systems Now

The starting point for cyber criminals is to find a way into a target’s network - in the majority of cases that begins by exploiting a human error.

2023-08-29

NIS2 Regulations Are Coming – Are You Ready?

EU Network & Information Security Rules: Tighter rules and tougher sanctions will apply to more organisations than before. By Graham Hawkey

2023-08-23

Identifying & Analysing Emerging Cloud Threats

The sheer speed and scope of the cloud native environment demands smarter decisions when prioritising limited resources. By Nurit Bielorai

2023-08-23

Major Sporting Events Are Open Targets

The State Of Play: Microsoft and the NCSC identify major sporting events, organisations and venues as increasingly vulnerable to cyber attack.

2023-08-29

Cyber Security Firm Dragos Targeted By Hackers

An unsuccessful attempt to extort one cyber security firm involved not merely a risk to data security, but a very personal threat to the CEO's family.

2023-08-29

Understanding Generative AI

The potential of Generative AI to revolutionise content creation makes it important to understand what is, how it’s being used and by whom.

2023-08-29

Numerous Organisations Are Banning ChatGPT

A Permanent Ban: Fears around the potential misuse of generative AI tools such as ChatGPT are spreading among IT decision makers.

2023-08-16

The UN Cybercrime Convention Could Help & Harm Victims

The proposed UN cybercrime convention has both risks & opportunities for protecting vulnerable groups. By Isabella Wilkinson & Amrit Swali

2023-08-14

Embracing The Passwordless Future

Strengthening Security & User Experience: Passwords are not only a security risk but also a big source of frustration for users. By Mesh Bolutiwi

2023-07-31

Trains Are A Cyber Security Risk

Cyber security concerns are increasing along with political tensions, and because critical infrastructures might be at risk from hackers.

2023-08-08

A Database Tracking Maritime Cyber Attacks

The incidents in the database demonstrate the relevance of cyber security to the modern maritime industry and the major vulnerabilities that exist.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Calyptix Security

Calyptix Security

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology.

Bleam Cyber Security

Bleam Cyber Security

Bleam is a leading provider of Managed Cyber Security Services and Information Security consulting. We deliver enterprise class security services to UK SME’s to stop data breaches.

Audea

Audea

Audea is a consultancy firm specialising in cybersecurity, risk and compliance. We provide professional services addressing all areas of Cybersecurity and GRC.

Prevasio

Prevasio

Prevasio is a next-gen Cloud Security Posture Management (CSPM) with a built-in Vulnerability and Anti-Malware Scan for Containers.

AHAD

AHAD

AHAD provides cybersecurity, digital transformation, and risk management services and solutions to Government, Fortune 500, And Start-Up Companies in the Middle East region.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

Panoplia Digital Protection

Panoplia Digital Protection

Panoplia Digital Protection is a cutting-edge cybersecurity company that leverages the power of AI and ML to help businesses and consumers protect themselves against cyber threats.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.

ALSO Group

ALSO Group

ALSO is one of the leading technology providers for the ICT industry currently active in 31 countries in Europe and in many countries worldwide via PaaS (Platform as a Service) partners.

Raven

Raven

Raven are on a mission to help companies protect their cloud native applications by focusing on runtime.