For continued FREE access to Articles and Directory Listings please LOGIN to your Account or REGISTER.
2025-06-02

Cybersecurity Summer Reading List

What’s Happening In The World Of Cybersecurity? Here are some books, blogs, articles & podcasts you might check out in your downtime

2025-06-23

Israel-Iran Conflict Escalates With Surging Cyber Attacks & Disinformation

Cyberspace Emerges As A Key Battlefield: Patriotic hacktivists, online propagandists and opportunistic cybercriminals are piling in to the cyberwar.

2025-06-23

The Future Of Digital Leadership Starts With The Website

Downgrading website strategy misses a critical opportunity to unite technology governance with business outcomes. By Doug Cunningham

2025-06-23

Japan's Active Cyber Defense Strategy

Pre-Emptive Defence: Japan is creating a new cyber security strategy to monitor external telecommunications & quickly respond to impending attacks.

2025-06-23

Pakistan’s Cyber Offensive: APT36 Targets Indian Defence

Transparent Tribe: A social engineering campaign exploiting ID credentials to deliver malicious payloads, infiltrate systems & gather intelligence.

2025-06-23

The UK’s Defence Shift & The Urgency Of Sovereign Digital Infrastructure

Rethinking The Stack: Resilience today is not just about redundancy. It is about ownership of code, protocols, and platforms. By Matthew Hodgson

2025-06-20

Cybersecurity Has Become Britain's Top Defence Priority

Cybersecurity Is Not Just A Technical Priority: To stay ahead means investing in smarter, faster, & more autonomous defences. By Dan Jones

2025-06-20

Three Million Records Exposed In Passion.io Data Breach

The exposure poses significant cyber risks, particularly for social engineering and phishing attacks, which account for 98% of cybercrimes.

2025-06-18

Maritime Cyber Security Is Too Weak

Attackers don’t always go for the bridge - they go for the inbox. Protecting maritime assets requires a layered cyber security framework & training.

2025-06-18

The Future For Internet Search Lies In AI

By enhancing search capabilities through advanced AI models, users can redefine how they interact with the Internet in their online search.

2025-06-17

How To Spot Phishing, Vishing & Smishing

Be alert to tactics that exploit personal information to craft convincing fraudulent communications & extract sensitive data. By John Mc Loughlin

2025-06-17

NATO Allies Expose Russian Cyber Campaign Targeting Ukrainian Supporters

Fancy Bear Unveiled: Russia’s secret military hackers are presenting a serious risk to those involved in the delivery of assistance to Ukraine.

Subscribe!

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Qatar Computing Research Institute (QCRI)

Qatar Computing Research Institute (QCRI)

QCRI perform cutting-edge research in such areas as Arabic language technologies, social computing, data analytics, distributed systems, cyber security and computational science and engineering.

DataProtect

DataProtect

DataProtect is a specialized information security company providing consultancy, information management, integration and training services.

Advisera 27001Academy

Advisera 27001Academy

Advisera is a market leader in providing documentation and online support for the implementation of business standards including ISO 27001, ISO 22301 and EU GDPR.

Virtue Security

Virtue Security

Virtue Security are specialists in web application penetration testing.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Jamf

Jamf

Jamf is the only Apple Enterprise Management solution of scale that remotely connects, manages and protects Apple users, devices and services.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

TetherView

TetherView

TetherView provides leading virtual desktop and email security technology to help businesses stand up and manage digital workspaces.

Q-Bird

Q-Bird

Q*Bird's mission is to provide equipment for the current, and future European quantum internet.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Ridgeline International

Ridgeline International

Ridgeline helps organizations manage digital risk through data privacy and secure infrastructure solutions.

Shieldworkz

Shieldworkz

Shieldworkz secure Operational Technology environments and protect businesses with best-in-class professional services and cyber security solutions.