News

2025-07-10

Turning Compliance Into Competitive Advantage 

Governance, Risk & Compliance: Organisations are shifting GRC's role from a regulatory obligation to a strategic business enabler. By Matt Hillary

2025-07-09

Ground-Breaking Effects Of Technological Developments In Electronics [extract]

Redefining Our Relationship With Machines: From AI and 5G to quantum & neuromorphic computing, these innovations are proving transformative.

2025-07-09

Ground-Breaking Effects Of Technological Developments In Electronics

Redefining Our Relationship With Machines: From AI and 5G to quantum & neuromorphic computing, these innovations are proving transformative.

2025-07-09

Spending On AI Predicted To Surge In 2025

A Leap in Investment: Businesses are optimistic about AI’s transformative potential, with 82% saying GenAI will positively affect them.

2025-07-09

Ingram Micro Grapples WIth SafePay Ransomware Attack

The attack has sent ripples through the global IT supply chain, highlighting vulnerabilities in even the most trusted technology organisations.

2025-07-08

Qantas Contacted By Perpetrator Of Massive Customer Data Breach

While the breach has been attributed to the prolific hacking collective known as Scattered Spider, Qantas has not confirmed the nature of the contact.

2025-07-07

BMW Financial Services Suffers Supply Chain Breach 

Customer Data Stolen: BMW Financial Services USA has been caught out in a third-party data breach involving a financial services supplier.

2025-07-08

Gamers Can Help Bridge The Skills Gap

An Unlikely Source Of Talent? The skills enabling successful video gamers align with those required by cybersecurity professionals. By Shlomie Liberow

2025-07-08

Unlocking AI’s Power In Cybersecurity

GraphRag: Overcoming challenges of integrating Large Language Models as reliable elements of the cyber defence community. By Dominik Tomicevic

2025-07-08

Big Surge In Identity-Driven Cyber Threats

A new report highlights Managed Detection & Response as the key to effective cybersecurity in protecting user identities against attacks.

2025-07-07

An Organisation’s Responsibility Following A Data Leak

Empathy & Action: Data breaches are serious events that affect real people, not just abstract statistics. By Wouter Klinkhamer

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Fastpath Solutions

Fastpath Solutions

Fastpath deliver software solutions that enable you to take control of your security, compliance and risk management initiatives.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

SecureDevice

SecureDevice

SecureDevice is a Danish IT Security company.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

CYDES

CYDES

CYDES is the first event in Malaysia to showcase advanced solutions and technologies to address cyber defence and cyber security challenges for the public and private sectors.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Athreon

Athreon

Athreon utilizes a fusion of AI technology, human interpretation, and the latest in cybersecurity to deliver sound business solutions that help our clients make better data-driven decisions.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Blue Mantis

Blue Mantis

Blue Mantis is a security-first, IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization.

Axiotrop

Axiotrop

AXIOTROP is a Cybersecurity firm offering leading services in assessment, remediation, and validation to protect the confidentiality, integrity, and availability of regulated information.

BreachRx

BreachRx

BreachRx is the first intelligent incident response management platform that provides operational resilience for the entire enterprise.