News

2025-06-13

Jony Ive Partners With OpenAI To Redefine AI Hardware

Described by OpenAI CEO Sam Altman as the “greatest designer in the world,” Ive takes on a leading role in design and creative direction at OpenAI.

2025-06-17

NATO Allies Expose Russian Cyber Campaign Targeting Ukrainian Supporters

Fancy Bear Unveiled: Russia’s secret military hackers are presenting a serious risk to those involved in the delivery of assistance to Ukraine.

2025-06-03

Cartier Confirms Customer Data Exposure

The Luxury jewelry retailer has disclosed a security breach in a customer notification, following unauthorized system access & data exposure.

2025-06-17

How To Spot Phishing, Vishing & Smishing

Be alert to tactics that exploit personal information to craft convincing fraudulent communications & extract sensitive data. By John Mc Loughlin

2025-06-02

Cybersecurity Summer Reading List

What’s Happening In The World Of Cybersecurity? Here are some books, blogs, articles & podcasts you might check out in your downtime

2025-06-10

Critical Vulnerabilities Disclosed In Versa Concerto

Exploits In The Wild Place Organisations At Risk: An authentication bypass enables attackers to gain admin access & execute commands remotely. 

2025-06-02

British NHS Trusts Hit By Major Cyberattack: Data Stolen  

Healthcare Trusts In London & Southampton Targeted: Patient data may have been compromised due to an Ivanti Mobile Endpoint vulnerability.

2025-05-01

Introducing Modern SecOps, a more realistic alternative to the “autonomous SOC” 

Modern SecOps: Better execution, efficiency, and analyst satisfaction with this new model. By Eoin Hinchy Learn more.

2025-06-11

The Future Of AI Is On-Device

Private By Design: On-Device AI addresses the privacy issues of cloud-based models by putting control in the hands of the user. By Rob Moffat

2025-05-29

Significant Breach Disrupts Victoria’s Secret

The renowned lingerie retailer, Victoria’s Secret, is the latest high-profile target in a surge of recent attacks sweeping across major global brands.

2025-06-10

The CVE Program’s Close Call

A Wake-Up Call: The future demands a decentralized, resilient, & context-rich vulnerability intelligence infrastructure. By Jonathan Sar Shalom

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Joe Security

Joe Security

Joe Security specializes in the development of automated malware analysis systems for malware detection and forensics.

Ioetec

Ioetec

Ioetec's mission is to connect users to their IoT devices securely, ensuring these devices remain safe to use in our increasingly connected world.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

RCDevs

RCDevs

RCDevs is an award-winning Software company providing security solutions designed for modern enterprise technologies and suited for SMEs to large corporations.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Presidio Identity

Presidio Identity

Presidio Identity offers a digital-native approach that brings security, privacy, and simplicity to user authentication and digital interactions.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Avetta

Avetta

Avetta One is the industry’s largest Supply Chain Risk Management (SCRM) platform. It enables clients to manage supply chain risks and suppliers to prove the value of their business.

Sterling Information Technologies

Sterling Information Technologies

Sterling is an information security, operational risk consulting and advisory group. Our Advisory services help to safeguard information assets while supporting business operations.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

SFY Information Technology

SFY Information Technology

SFY helps companies with Cyber Security and Managed IT, allowing them to focus on what really matters to them.