For continued FREE access to Articles and Directory Listings please LOGIN to your Account or REGISTER.
2025-07-09

Ground-Breaking Effects Of Technological Developments In Electronics [extract]

Redefining Our Relationship With Machines: From AI and 5G to quantum & neuromorphic computing, these innovations are proving transformative.

2025-07-10

GitHub Exploited In Sophisticated Malware Campaign

Malware Disguised As A VPN App: Increasing reliance on open-source repositories calls for much higher-levels of vigilance for deceptive tactics.

2025-07-10

ServiceNow Vulnerability Exposes Sensitive Data To Low-Privilege Users

Count(er) Strike: ServiceNow handles vast amounts of sensitive information across IT operations, HR & Portfolio Management for thousands of companies.

2025-07-10

Turning Compliance Into Competitive Advantage 

Governance, Risk & Compliance: Organisations are shifting GRC's role from a regulatory obligation to a strategic business enabler. By Matt Hillary

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-09

Rockerbox Data Breach Exposes Sensitive Information Of Millions

Exposed Cloud Bucket: A lack of encryption or authentication measures meant that anyone with basic technical knowledge could access sensitive data.

2025-07-09

Spending On AI Predicted To Surge In 2025

A Leap in Investment: Businesses are optimistic about AI’s transformative potential, with 82% saying GenAI will positively affect them.

2025-07-08

Qantas Contacted By Perpetrator Of Massive Customer Data Breach

While the breach has been attributed to the prolific hacking collective known as Scattered Spider, Qantas has not confirmed the nature of the contact.

2025-07-08

Unlocking AI’s Power In Cybersecurity

GraphRag: Overcoming challenges of integrating Large Language Models as reliable elements of the cyber defence community. By Dominik Tomicevic

2025-07-08

Gamers Can Help Bridge The Skills Gap

An Unlikely Source Of Talent? The skills enabling successful video gamers align with those required by cybersecurity professionals. By Shlomie Liberow

2025-07-08

Big Surge In Identity-Driven Cyber Threats

A new report highlights Managed Detection & Response as the key to effective cybersecurity in protecting user identities against attacks.

2025-07-07

BMW Financial Services Suffers Supply Chain Breach 

Customer Data Stolen: BMW Financial Services USA has been caught out in a third-party data breach involving a financial services supplier.

Subscribe!

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

North American Electric Reliability Corporation (NERC)

North American Electric Reliability Corporation (NERC)

NERC is a not-for-profit international regulatory authority whose mission is to assure the reliability and security of the bulk power system in North America.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

FirstPoint

FirstPoint

FirstPoint has developed the market’s most advanced solution for securing cellular devices, including mobile phones and IoT products, by blocking malicious data leakage.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Fasken

Fasken

Fasken is one of the largest business law firms in Canada and a recognized leader in privacy and cybersecurity law.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.

Zeroday Ops

Zeroday Ops

At ZeroDay Ops, our vision is to democratize cybersecurity by making enterprise-grade vulnerability assessment accessible, continuous, and actionable for every organization in the digital world.