News

2022-01-04

The Top 10 Most Severe Vulnerabilities In 2021

Gain insights into the top 10 most critical vulnerabilities of 2021 to ensure that your system is not a sitting duck for remote attackers.

2022-01-04

Disinformation Is A Prevalent Threat

Disinformation-For-Hire: Advertising, Marketing and PR companies are busy manipulating online opinion for politicians & governments.

2022-01-04

The Cyber Security Risks Of Outsourcing

Out Of Control: IT outsourcing is a major contributor to cyber security risk exposure and the consequences of a breach can be very damaging.

2022-01-03

Artificial Intelligence Monitors Critical Infrastructure

Artificial Intelligence and video surveillance tools are being being increasingly adopted to monitor and protect critical infrastructure facilities.

2022-01-03

NSO Spyware Used To Hack Political Leaders In Poland

Spyware from NSO Group has been used in the hack of leading opposition politicians in Poland, in the latest instance of covert surveillance.

2022-01-03

Cyber Attack On Britain’s Defence Academy

A damaging attack on Britain's national Defence Academy, possibly by Russia or China, is an indication of how modern warfare is evolving.

2022-01-03

Malicious Joker App Gets Half A Million Downloads

Joker Malware is a persistent threat that infects legitimate apps then steals from users by subscribing them to unwanted subcription services.

2022-01-03

Belgium’s Military Suffer From Log4j Attack

The Belgian Defence Ministry's computer network is being restored to full operation following an attack delivered via Log4shell vulnerabilities.

2021-12-22

Britain's HMRC Tax Agency Admits Numerous Data Breaches

The HMRC has disclosed 17 breaches in 15 months from 2020, affecting 3,000 individuals, as a result of unauthorised changes to personal records.

2021-12-29

Most British Workers Are Unaware Of Cyber Threats

Don't Know, Don't Care: Only a quarter of UK employees are aware of cyber risks, although more than half have been affected by an attack.

2021-12-31

British Plan To Become A ‘Global Cyber Power’ In 2022

Britain plans to advance in cyberspace and will support its workforce & industry in upgrading the technologies vital to developing its cyber power.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Wisegate

Wisegate

Wisegate is a community of IT experts providing advisory services on all areas of IT including security.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

National Authority for Electronic Certification and Cyber Security (AKCESK) - Albania

AKCESK ensures security for trusted services, in particular reliability and security in electronic transactions between citizens, businesses and public authorities.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Titan Labs

Titan Labs

Titan Labs is a Cyber Security Consultancy that provides advice and technical expertise to government, international finance and telecommunications providers.

Surefire Cyber

Surefire Cyber

Surefire Cyber delivers swift, strong response to cyber incidents such as ransomware, email compromise, malware, data theft, and other threats with end-to-end response capabilities.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

DataProof Communications

DataProof Communications

DataProof Communications is Cybersecurity Company specialising in cybersecurity operations, incident management and response best practices and technologies.

SiyanoAV

SiyanoAV

SiyanoAV's range of antivirus products delivers strong protection against various cyber threats, including malware, ransomware, phishing schemes, and beyond.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.