NEWS > Cybersecurity News


« Back to News

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-05

Email Infection Chains Are Diversifying In 2022

Maldocs Are The Weapon Of Choice: Over 60% of malicious payloads are embedded in various document types attached to email. By Ian Porteous

2022-08-30

Blacklisted Israeli Spyware Firm CEO Quits

NSO Group will now focus on sales to countries belonging to NATO, following alleged misuse of its notorious Pegasus smartphone spyware.

2022-08-29

Detect Spoofing Before Your Organisation Suffers Fraud

Business Email Compromise fraud is where cyber criminals impersonate senior managers and end users should be very cautious before paying invoices.

2022-08-20

Ukraine Knocks Out A Russian Bot Network

Ukraine's security services claim to have stopped a network operating over a million bot accounts distributing fake news to destabilise the nation. 

2022-08-17

CISA & ACSC Name 2021’s Top Malware

New Capabilities & Evading Detection. The top malware types include RATs, banking Trojans, information stealers and ransomware. 

2022-08-15

NCSC Cyber Security Breaches Survey 2022

What are the different cyber attacks that British organisations face, how are these organisations impacted and how do they respond?

2022-08-15

The Top 3 Current Email Threats

Email is a vulnerable part of most organisations' infrastructure and can be used for delivering phishing scams, business compromise & ransomware.

2022-08-15

$3 Million Romance Fraudster Arrested

#YourAccountYourCrime: Police make a high profile arrest as Interpol launches a new campaign warning of the dangers of romance scams.

2022-08-12

Cyber Attacks On Port of Los Angeles Have Doubled

40 Million Attacks Each Month: The port of Los Angeles is working with the FBI’s Cyber Resilience Centre to prevent attacks & improve security. 

2022-08-10

Mercenary Cyber Spies For Hire

Professional Services: The threat posed by private firms with cyber capabilities that rival the world’s most skilled spy agencies is not widely known.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

Rentalworks

Rentalworks

Rentalworks is a leading provider of Internet-of-Things (IoT) Asset Lifecycle Management Services including secure data erasure and disposal.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Scythe

Scythe

SCYTHE is a next generation red team platform for continuous and realistic enterprise risk assessments.

Gravitee

Gravitee

Gravitee helps organizations manage and secure their entire API lifecycle with solutions for API design, management, security, productization, real-time observability, and more.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

eGeneration

eGeneration

eGeneration is one of the leading technology solutions and system integration companies in Bangladesh.

DataGuard

DataGuard

DataGuard is a security and compliance software company trusted by organisations across the globe.