NEWS > Cybersecurity News


« Back to News

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2021-12-31

British Plan To Become A ‘Global Cyber Power’ In 2022

Britain plans to advance in cyberspace and will support its workforce & industry in upgrading the technologies vital to developing its cyber power.

2021-12-24

Log4j Cyber Security Flaw Seriously Concerns Experts

The Log4j vulnerability is being widely exploited by a growing number of threat actors, prompting government officials to take action.

2021-12-31

Security Trends For 2022 - The Need For Talent & Cloud Migration

2021 was a turbulent year in cyber security and two significant trends for 2022 are the need for talent and a move to the cloud. By Mark Guntrip

2021-12-13

Critical Fault with Log4j Software

Alert: Attackers are exploiting a critical vulnerability in Apache Log4j, a logging library that's used in millions of Java-based applications.

2021-12-31

Cyber Security In 2022

Strategic & Tactical predictions for the digital ecosystem, which faces even more challenges & numerous sophisticated threats in 2022. By Chuck Brooks

2021-12-07

Cyber Attacks Should Be The #1 Concern For Business Leaders

Prevention Is The Priority: Over 80% of board directors surveyed identified cyber attacks as the biggest threat that their business currently faces.

2021-12-02

Clearview Faces £17 Million Penalty For Breaching Data Laws

The data of a substantial number of Britons may have been scraped from social media platforms and other online sources without consent.

2021-11-30

Worldwide Cyber Security Threats

Cyber security threats, risks & challenges share many common factors in exploiting vulnerabilities, but vary significantly from one country to another.

2021-11-24

The Cyber Security Industry Will Soon Be Worth Over $300 Billion

Spending on cyber security is increasing fast to keep pace with the rise in cyber crime and malware attacks on governments, business & healthcare.

2021-11-11

Microsoft Gets Serious About Dealing With The Skills Shortage

Microsoft plans to halve the United States' cyber security workforce shortage by 2025 by pouring big money and resources into training programs.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Information Risk Management (IRM)

Information Risk Management (IRM)

IRM is an international consultancy dedicated to helping organisations solve key business issues. We provide strategic cyber security advice across a wide range of sectors.

4Secure

4Secure

For over two decades, 4Secure has specialised in cyber security consultancy, safeguarding the worlds critical Infrastructure through securely bridging air gapped networks.

FinalCode

FinalCode

FinalCode offers a file encryption and file-based enterprise digital rights management (eDRM) platform.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

CyberSecurityTrainingCourses.com

CyberSecurityTrainingCourses.com

Cyber Security Training Courses is a portal to help candidates find the best courses to progress their career within the IT security industry.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Quad9 Foundation

Quad9 Foundation

Quad9 is a free security solution that uses DNS to protect your system against the most common cyber threats. It improves your system's performance, plus, it preserves and protects your privacy.

CyberconIQ

CyberconIQ

CyberconIQ provide an integrated Human Defense Platform that reduces the probability and/or the cost of a cybersecurity breach by measurably improving our clients risk posture and compliance culture.

Orchestrate Technologies

Orchestrate Technologies

Orchestrate Technologies provides computer network and IT managed services for small and mid-market clients as well as small enterprise businesses.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

Hurricane Labs

Hurricane Labs

Hurricane Labs is a managed security services provider (MSSP) that focuses on Splunk.

Cyberscore

Cyberscore

CyberScore specialize in digital security assessments that preventively make digital environments safer against malicious attacks from inside and outside.