News

2025-03-17

From Static Defenses To Dynamic Systems

Resilience isn’t just about enduring threats - it’s about maintaining the ability to operate and recover under any circumstances. By Engin Kirda

2025-03-17

Medusa Ransomware Attacks Focus On Critical Infrastructure

Double Extortion: Even if the victim organisation can recover their encrypted files, they still face the threat of their sensitive data being leaked.

2025-03-14

Shadow IT In Remote Work

Portable Storage: Businesses that fail to address shadow IT risk losing control of their sensitive data and put themselves at risk. By Jon Fielding

2025-03-17

What Apple's Standoff With The UK Government Means For Your Data

Privacy On The Line: Creating a lawful mechanism for backdoor access means creating risks for everyone else. By Paul Holland

2025-03-16

Continuous Cybersecurity Learning Is Business-Critical

Security has shifted from IT mandate to executive imperative, this is why continuous learning is a business-critical function. By Alexia Pedersen

2025-03-13

Protecting Digital Infrastructure Without Going Broke

A modern, data-driven age requires modern, data-storage infrastructures that protect the interests of our nation's citizens. By Adrian Fern

2025-03-10

Israel’s Emergency Medical Service Attacked

In the latest incident, the long-standing & powerful cyber threat from Iran has been directed against a leading Israeli emergency healthcare provider.

2025-03-11

DOGE Is Undermining US Government Cyber Security

The US Dept. of Government Efficiency has unprecedented access to highly sensitive federal databases & payment tools, with perilous consequences.

2025-03-11

How CISOs Can Demonstrate The Value Of Their Investments

CISOs Face Many Budget Challenges: Key strategies CISOs can adopt to communicate the value of their investments effectively. By Chad LeMaire

2025-03-12

Cyber Attackers Strike X

Update: Dark Storm claim responsibility for the extensive outage on the X social media platform in a well-resourced, co-ordinated attack.

2025-03-10

ZTNA - Back To Basics

Zero Trust Network Architecture: Redefining cybersecurity by treating every user, device & connection as inherently untrustworthy. By Christian Have

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

MetaCompliance

MetaCompliance

MetaCompliance is a cyber security and compliance organisation that helps transform your company culture and safeguard your data and values.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Cybersec Infohub

Cybersec Infohub

Cybersec Infohub is a Hong Kong government programme to enhance the exchange of cyber security information with industry and enterprises to jointly defend against cyber attacks.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Havoc Shield

Havoc Shield

Havoc Shield is an all-in-one information security platform that includes everything a growing team needs to secure their remote workforce.

Kontex

Kontex

Kontex is a Cyber Security consultancy creating resilient solutions. From Strategy, Advisory and Implementation to Management and everything in between.

NARIS

NARIS

NARIS is the leading provider of an integrated Governance, Risk and Compliance platform called NARIS GRC.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

IriusRisk

IriusRisk

IriusRisk is an open Threat Modeling platform that automates and supports creating threat models at design time.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Proaxiom

Proaxiom

Proaxiom are focused on erasing cyber driven panic paralysis for Small and Medium Enterprises through brilliant cyber technologies which drive productivity and support growth.

Cybermate

Cybermate

Cybermate is the first affordable, gamified ‘Psybersecurity’ awareness training platform that reduces behavioural risk and achieves compliance with Australian cybersecurity standards.