NEWS > Cybersecurity News


« Back to News

2023-08-16

The UN Cybercrime Convention Could Help & Harm Victims

The proposed UN cybercrime convention has both risks & opportunities for protecting vulnerable groups. By Isabella Wilkinson & Amrit Swali

2023-08-14

Embracing The Passwordless Future

Strengthening Security & User Experience: Passwords are not only a security risk but also a big source of frustration for users. By Mesh Bolutiwi

2023-07-31

Trains Are A Cyber Security Risk

Cyber security concerns are increasing along with political tensions, and because critical infrastructures might be at risk from hackers.

2023-08-08

A Database Tracking Maritime Cyber Attacks

The incidents in the database demonstrate the relevance of cyber security to the modern maritime industry and the major vulnerabilities that exist.

2023-08-01

Have We Become Complacent About The ‘Insider Threat’?

Time Bomb: Human beings will always make mistakes, let their guard down, and behave in ways that leave company data exposed. By Jon Fielding

2023-07-31

British University Data Breaches Are A Lesson For All

The potential reach and impact of a breach is serious, placing personal information at risk and disrupting millions of UK students. By Stuart Jubb

2023-08-09

WatchGuard Expands Identity Protection Capabilities

The new solution adds advanced password management capabilities and Dark Web monitoring to help protect corporate credentials.

2023-07-19

Details On How Revolut's Payment System Got Hacked

Hackers exploited differences between European and US payment systems, finding an unknown flaw enabling them to steal over $20m.

2023-08-03

The Most Used Malware In H1 2023

Qbot has been the most prevalent malware so far in 2023, ranking first in five out of the six months to date, while MOVEit has made a big impact.

2023-08-02

TrueBot: Cyber Security Agencies Issue A Warning

A new variant of TrueBot malware is focusing on companies in the US and Canada, aimed at stealing private data from infiltrated systems.

2023-08-02

A Cyber Security Plan For Digital Currency

Central Bank Digital Currencies: The BIS has laid out a seven-point plan designed to help countries prevent cyber attacks on digital currencies.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Robert Half Technology

Robert Half Technology

Robert Half Technology offers a full spectrum of technology staffing solutions to meet contract and full-time IT recruitment needs.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

OwnBackup

OwnBackup

OwnBackup proactively prevents you from losing mission-critical data and metadata with automated backups and rapid, stress-free recovery.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

DuploCloud

DuploCloud

DuploCloud offers an end-to-end DevOps software platform for dev teams that don’t have dedicated DevOps engineers and augments those that do.