News

2025-01-13

The British Government’s AI Action Plan 

The new AI regime in Britain could facilitate a “sweet spot”, attracting the sort of investment and innovation intended to boost economic growth. 

2025-01-10

Q3 2024: Over Half A Million Cyber Attacks On Critical Infrastructure

The attack surface has never been wider, threat actors are broadening their horizons, while ransomware groups are becoming more sophisticated.

2025-01-10

AI-Enhanced Attacks Are A Rising Threat

As AI is more widely adopted, companies are creating more vulnerabilities within their own organisations and attacks will become more sophisticated.

2025-01-11

CISA Finds Serious Problems In Oracle & Mitel Systems

Known Exploited Vulnerabilities: Thousands of network servers found to be exposed to unauthorised admin access and data extraction.

2025-01-09

How To Streamline Compliance With NIS2 & DORA 

Managed Detection & Response: A proactive approach that enables organisations to meet the demands of NIS2 & DORA effectively. By Notis Iliopoulos

2025-01-10

How “Right-Sizing” Cybersecurity Initiatives Can Prevent Data Loss

Striking a balance between data protection, cost-effectiveness, usability, and discovering an approach to cybersecurity that works for your business.

2025-01-09

Looking Ahead Of The OMB Zero Trust Mandate In 2025

The Benefits Are Clear: Zero Trust is revolutionizing how organizations safeguard their environments. By Dylan Owen

2025-01-08

What SMBs Already Know About Ransomware & How To Build On It

Despite their differences, ransomware criminals and small business owners manage operations similarly. Let's explore their commonalities.

2025-01-08

Facebook & Instagram Remove Fact Checkers

Mark Zuckerberg said that content moderators were "too politically biased" and it was "time to get back to our roots around free expression".

2025-01-07

The Leading Indian Cyber Security Companies (extract)

India's top cyber security companies have a growing International profile and now operate at the forefront of the rapidly evolving threat landscape.

2025-01-07

Modular Design: IBM's Big Quantum Computer

IBM intends to build the largest quantum computer by linking smaller machines to create one with a record-breaking number of qubits.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

InfoSec World

InfoSec World

InfoSec World conference and expo covers all aspects of information security with a broad agenda of sessions on key security issues.

Foregenix

Foregenix

Foregenix are global specialists in Digital Forensics and information security including Penetration testing and Website Security.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

KIOS Center of Excellence (KIOS CoE)

KIOS Center of Excellence (KIOS CoE)

KIOS carries out top level research in the area of Information and Communication Technologies (ICT) with emphasis on the Monitoring, Control and Security of Critical Infrastructures.

BEAM Teknoloji

BEAM Teknoloji

BEAM Technology is an independent Software Quality and Security Testing Center in Turkey.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Falcongaze

Falcongaze

Falcongaze SecureTower is a comprehensive DLP solution for the protection of business against internal threats.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Airiam

Airiam

Airiam provides cybersecurity, managed IT, consulting, incident response, and digital transformation services so you can focus on what matters most.

Vali Cyber

Vali Cyber

Vali Cyber was founded in 2020 with the mission of addressing the specific cybersecurity needs of Linux.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions and cyber defense consultancy service.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

Cylerian

Cylerian

Cylerian is a Next Generation SaaS Security Platform - One unified cloud platform to achieve your security, compliance, and operational objectives.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Konsulko Group

Konsulko Group

Konsulko Group offers embedded Linux software and hardware development and Yocto Project services.