News

2025-04-29

Five Top-Rated Threat Intelligence Platforms

Cyber Threat Intelligence: High quality analytics are priceless in curating thoughtful risk management and business continuity plans.

2025-04-29

British Government Needs To Lean On Automation To Bolster Cyber Resilience

Autonomous Endpoint Management: A precise overview of government IT assets & vulnerabilities, immediately improving cybersecurity. By Dan Jones

2025-04-29

Ransomware Attacks On The Energy Sector Surging

Operational Technology, Geopolitics & Hacktivism: Ransomware attacks targeting the energy and utilities sectors increased by 80% in 2024.

2025-04-29

Blackouts In Spain & Portugal Likely Caused By A Cyber Attack

Atmospheric Oscillation Or Hostile Action? A massive power outage has disconnected homes, industry and vital services across Spain & Portugal.

2025-04-28

Cybersecurity Risks In Legacy Scheduling Systems & How To Mitigate Them

Scheduling Software: Relying on legacy systems without actively investing in updates and patches can open businesses to cybersecurity risks.

2025-04-28

AI Uncovers A Cause Of Alzheimer’s Disease

Using AI, researchers at California University have revealed that there is a hidden DNA-binding function with a causal role in disrupting the brain.

2025-04-28

Chinese Hackers Exploiting Ivanti Connect Secure Vulnerability 

Ivanti has confirmed that a stack-based buffer overflow in Ivanti Connect Secure, Policy Secure & ZTA Gateways can lead to remote code execution.

2025-04-25

Traditional Cyber Insurance Isn’t Built For AI-Driven Attacks

Malicious Actors: As AI evolves, so does cybercrime - often outpacing the ability of businesses or insurers to respond effectively. By Randy Sadler 

2025-04-24

M&S Chaos: Leading British Retail Chain Attacked

Contactless payments have failed with many shoppers facing frustration at the checkout, as the company struggles to recover from a cyber attack.

2025-04-24

Apple & Meta Fined €700m By EU Commission

Breaches Of Digital Markets Act: Consumer choice and misuse of personal data are the key regulatory issues behind imposition of major penalties.

2025-04-24

How CISOs Can Speak The Language Of Risk & Resilience 

Boardroom Lingo & Accountability: The most effective CISOs today aren’t just securing infrastructure, they’re securing trust. By Tim Grieveson

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cynet

Cynet

Cynet simplifies security by providing a rapidly deployed, comprehensive platform for detection, prevention and automated response to advanced threats with near-zero false positives.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Thinkst Applied Research

Thinkst Applied Research

Thinkst is an Applied Research company with a deep focus on information security.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

Swedish Board for Accreditation and Conformity Assessment (SWEDAC)

SWEDAC is the national accreditation body for Sweden. The directory of members provides details of organisations offering certification services for ISO 27001.

The Security Company (TSC)

The Security Company (TSC)

The Security Company is a leading provider of creative employee security awareness programmes.

Insight Partners

Insight Partners

Insight Partners is a leading global private equity and venture capital firm investing in growth-stage technology, software and Internet businesses.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

mxHERO

mxHERO

mxHERO reduces the risks inherent with ransom and cyber-security threats specific to email.

Polygraph

Polygraph

Polygraph monitors the activities of click fraud gangs, including how they operate, who they target, the techniques they use, and how to detect their fraud.

Deloitte Denmark

Deloitte Denmark

Swift incident management, worldwide support, and advanced defense strategies ensure comprehensive recovery and enterprise security with our IR service.

Hilltop Technologies

Hilltop Technologies

Hilltop Technologies is a cybersecurity company specialized in managed security services and consulting tailored for all sectors from higher education to publicly traded companies.

Hopper Security

Hopper Security

The Future of Open-Source Risk Management Starts Here. We built Hopper to make sure you can harness the power of Open-Source safely and effectively.