NEWS > Cybersecurity News


« Back to News

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-17

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal

Hacktivist groups have joined the conflict online, disrupting government websites, civil services & financial institutions. By Jeremiah Fowler

2023-10-13

Domain Phishing: Antidotes In Today’s Market

Phishing Threats: Doubling down on security measures is the key to protecting not only your web address but your business brand. By Brian Lonergan

2023-10-10

Sony Falls Victim To CLop Ransom Attack

Sony Interactive Entertainment has confirmed that the personal information of thousands of former & current employees has been exposed.

2023-10-09

Police Access To Passport Database 'risks public trust'

Plans to integrate the UK Police National Database and Passport Office data will enable police to find a facial match with the 'click of one button'.

2023-10-09

Garbage In / Garbage Out: Training AI Algorithms

One of the risks posed by AI technology is the significant security threat to the vast data needed to train their algorithms & improve performance.

2023-10-09

Cyber Incidents At British Firms Up 25%

Less than half of British companies are confident in their ability to handle the biggest threats facing organisations, including phishing & malware.

2023-10-03

Mapping Out The Journey To Zero Trust

Zero Trust has emerged as the gold standard cybersecurity methodology, but adopting it is a long term, evolutionary process. By John Linford

2023-10-02

The Rapid Rise In DNS Attacks Demands New Approaches To Cyber Defense

Rethinking Data Resilience: Every Domain Name System has weaknesses & there are several ways that attackers can exploit them. By Mark Johnson

2023-10-09

The US Security Standard For IoT Devices

Internet of Things: The expansively growing number of smart products already connected to networks bring enormous security challenges.

2023-10-06

Cyber Criminals Exploit Legitimate Software

Remcos & GuLoader: Research has found malicious trojans packaged with legitimate software widley available from criminally complicit vendors.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ProfitBricks

ProfitBricks

ProfitBricks is a secure cloud computing infrastructure-as-a-service (IaaS) solution.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Lightship Security

Lightship Security

Lightship Security is an accredited Common Criteria and FIPS 140-2 IT security testing laboratory that specializes in test conformance automation solutions and IT product security certifications.

Cynexlink

Cynexlink

Cynexlink offers Managed IT Services with Security, Network, Storage & Cloud solutions for all size of business.

SecZetta

SecZetta

SecZetta provides third-party identity risk solutions that are easy to use, and purpose built to help organizations execute risk-based identity access and lifecycle strategies.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

Graylog

Graylog

Graylog provides answers to your team’s security, application, and IT infrastructure questions by enabling you to combine, enrich, correlate, query, and visualize all your log data in one place.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

ClosingLock

ClosingLock

ClosingLock is the leading provider of wire fraud prevention software for the real estate industry.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

Transcendental Technologies

Transcendental Technologies

Transcendental is a consulting organization which specializes in customized assurance services in the fields of Localization, Mobile Software Solutions, Web Design, Cyber Security & Cyber Forensics.

TrueDeploy

TrueDeploy

Making Software Security EASY. The Security Status of Your Software in One Place. All you have to do is Deploy.

Right Hand Technology Group (RHTG)

Right Hand Technology Group (RHTG)

Right Hand Technology Group is a premier provider of IT services specializing in cybersecurity, managed IT solutions, and compliance.