NEWS > Cybersecurity News


« Back to News

2022-10-21

Under Pressure - Can CISOs Avoid Burnout?

CISOs are concerned about ransomware attacks evolving beyond their team’s knowledge, skills & capabilities. By Mark Guntrip

2022-10-14

A Mysterious New Hacking Group

Metador: An unknown new threat group has left researchers baffled about who may be behind their campaign and where they may be operating.

2022-10-18

Security Patching As A Service

Aunalytics launches its Security Patching Platform, Co-managed Patching As A Service to complement their Advanced Security solution suite.

2022-10-17

Developing Nations Face The Biggest Cyber Security Challenges

Digital Connectivity: The openness of the Internet requires all nations to have effective cyber security policies to have a safe, secure Internet.

2022-10-02

October Is Cyber Security Awareness Month

October: US Cybersecurity Awareness Month aims to raise awareness of cyber security risks and help people & businesses to protect their data.

2022-09-28

Denmark Wins 2022 European Cyber Security Challenge

Defend & Attack Under Pressure: ENISA's annual EU cyber security challenge competition set rival national teams against each other.

2022-10-05

Lessons From The Cyber Front Line

20:20 Hindsight: Some of the highest profile cyber attacks & breaches offer clear pointers on how to avoid similar attacks. By Nigel Thorpe

2022-09-27

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure

Square Peg In A Round Hole: The operating technology behind Industrial Control Systems & devices is a mystery to IT professionals. By Joe Weiss 

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-05

Email Infection Chains Are Diversifying In 2022

Maldocs Are The Weapon Of Choice: Over 60% of malicious payloads are embedded in various document types attached to email. By Ian Porteous

2022-08-30

Blacklisted Israeli Spyware Firm CEO Quits

NSO Group will now focus on sales to countries belonging to NATO, following alleged misuse of its notorious Pegasus smartphone spyware.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Securi-Tay

Securi-Tay

Securi-Tay is an information Security conference held by the Ethical Hacking Society at Abertay University, Dundee.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

MaskTech

MaskTech

MaskTech supplies highest security embedded chipsets, operating systems and related middleware for electronic identification cards, travel documents and authentication solutions.

Network Integrated Business Solutions (NIBS)

Network Integrated Business Solutions (NIBS)

NIBS is an IT services provider offering a range of services with the aim of simplifying and securing technology.

Pioneer Search

Pioneer Search

Pioneer Search is a UK based Technology & Change, Electronics Engineering, Cyber Security & Cloud and Data & Analytics Employment Agency.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

EdgeWatch

EdgeWatch

EdgeWatch is a platform that helps information accredited security practitioners discover, monitor, and analyze devices that are accessible from the Internet.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

Idenhaus Consulting

Idenhaus Consulting

Idenhaus specializes in Cybersecurity and Identity Management (IAM) Consulting.

Validia

Validia

Validia is a deepfake cybersecurity service that provides proactive and reactive defense to the deepfake threat enterprises increasingly face with the rapid growth of generative AI.

Cyberr

Cyberr

We’re transforming cybersecurity recruitment with Cyberr Intelligence – the AI-driven platform that connects top cybersecurity talent, both freelance and permanent, with leading employers worldwide.

Darknetsearch by Kaduu

Darknetsearch by Kaduu

Our dark web and deep web monitoring continuously tracks confidential data across dark web markets, telegram channels, paste sites, botnet logs, IRC, social media and other sources.