News

2024-03-13

International Initiative To Control Commercial Spyware

Britain, France and the US have joined with Google, Microsoft & Meta in a statement on the need for action to control malicious spying tools.

2024-03-13

Threat Intelligence Exposes The Extent of Cyber Attacks

Businesses Must Continually Adapt their Security Strategies: Expert threat intelligence from MSPs can help detect & remediate attacks quickly.

2024-03-06

Russian Military Botnet Dismantled

The US Department of Justice has disrupted a botnet controlled by the Russia state-sponsored hackers, Forest Blizzard - aka Fancy Bear.

2024-03-08

Email Attacks Doubled In 2023

Cyber criminals are exploiting AI-enhanced techniques to create more convincing phishing scams, guaranteeing that this challenge will escalate.

2024-03-05

Cybercrime Hit 1.5m UK Businesses In 2023

More than 1.5 million UK businesses fell victim to some form of cybercrime last year, at a cost of more than £30.5 billion. London lost £7.1 billion.

2024-03-11

Deepfakes Complicate Election Security

Detection & Controlling Deepfakes: Leading US technology companies have agreed to combat the deceptive use of AI In the US Elections.

2024-03-01

Surge in “Hunter-Killer” Malware

Discovered: A threefold increase in the types of destructive malware designed to actively target defensive systems & capable of disabling them.

2024-02-23

Data Breach - Bank of America Warns Clients & Customers

Bank of America is notifying customers of a cyber attack affecting 57,000 of them that their personal information was stolen in a data breach.

2024-02-29

Nation State Hackers Deploy AI

Offensive Cyber Operations: Microsoft says it has detected threats from foreign countries that have been trying to exploit OpenAI's tools.

2024-02-28

US Navy Will Use Data Analytics For Maritime Security

Structured Data Sets: The US Navy is planning to use automation & data analytics to improve cyber defenses for its unclassified networks.

2024-02-22

A Goal Without A Plan Is Just A Wish

Incident Response: If your goal is a robust information security programme then you must have an Incident Response plan. By Chris Denbigh-White

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Cisco Talos

Cisco Talos

Talos is an industry-leading threat intelligence solution that protects your organization’s people, data and infrastructure from active adversaries.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

QuSecure

QuSecure

QuSecure provides a software-driven security architecture that overlays your current infrastructure and provides next-generation security to protect your entire network from quantum threats.

Truvantis

Truvantis

Truvantis is a cybersecurity consulting organization providing best-in-class cybersecurity services to secure your organization’s infrastructure, data, operations and products.

Datastream Cyber Insurance

Datastream Cyber Insurance

DataStream Cyber Insurance is designed to give SMB’s across the US greater confidence in the face of increasing cyber attacks against the small and medium business community.

Upstack

Upstack

UPSTACK - One partner, end-to-end expertise, helping develop the solutions you need – when you need them.

Arcserve

Arcserve

Defend your data with Arcserve all-in-one data protection and management solutions designed to be the right fit for your business, regardless of size or complexity.

Peris.ai

Peris.ai

Peris.ai is a cybersecurity as a service startup that protects businesses and organizations from online threats.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.