News

2024-10-25

BRICS Summit: Russia's Foreign Ministry Attacked

Raining On Putin's Parade: Foreign Ministry was hit by a severe cyber attack, that coincided with a high profile BRICS summit in Kazan.

2024-10-25

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?

With economic pressures mounting, the need to modernise outdated IT systems and make smarter security investments is crucial. By Dan Lattimer

2024-10-25

Building Secure Workflows: Using LCNC Platforms For Automating Cybersecurity Tasks

Protecting sensitive data is critical, with increasing pressure on security teams. That's where low-code/no-code (LCNC) platforms come in.

2024-10-18

Four Reasons To Migrate Your Business To The Cloud

A Sound Migration Strategy: Many more companies are adopting cloud computing as a core part of their operations. Here are the reasons why.

2024-10-17

Cybersecurity Education: Preparing the Next Generation of Cyber Defenders 

The online threat environment is worsening and stakeholders must partner and ensure more students enroll in cybersecurity courses.

2024-10-23

The Flawed Reality Of Artificial Intelligence

There is a growing realisation that AI is just another technology tool, with fundamental flaws of which we must be careful. By Ron Marks

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-23

Private Equity Firms Should Make Cybersecurity Diligence A Priority

PE firms hold a wealth of sensitive information and cybersecurity is as important as “Quality of Earnings” for new acquisitions. By Chris Snyder

2024-10-22

How Can Cloud Risk Management Elevate Your Cybersecurity Posture?

With cloud computing, cybercrime has become more sophisticated, with unique risks like misconfigurations & insider threats. By Narendra Sahoo

2024-10-22

Celebrating 10 Years Of Kubernetes

The Journey To Date & What’s Next: Kubernetes is so embedded that it’s almost impossible to imagine life without it. By Rani Osnat

2024-10-21

Nowhere To Run

Killing As A Video Game: Lethal automated drones are moving from human directed targeting to pre-programmed targeting. By Ron Marks

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

CIO

CIO

CIO provides technology and business leaders with insight and analysis on information technology trends

Cleo

Cleo

Cleo is a leader in secure information integration, enabling both ease and excellence in business data movement and orchestration.

Organization for Security and Co-operation in Europe (OSCE)

Organization for Security and Co-operation in Europe (OSCE)

OSCE is the world's largest security-oriented intergovernmental organization. Areas of activity include Cyber/ICT security.

Fidelis Security

Fidelis Security

Fidelis Security is a leading provider of extended threat detection and response (XDR) solutions for your security operations.

Opscura

Opscura

Opscura (formerly Enigmedia) brings the reliable and cautious hands of operations together with the analytical minds of cyber experts and cryptography researchers.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Axellio

Axellio

Axellio provides economic, end-to-end cyber security solutions designed for your team, environment, and security objectives, providing packet level visibility across your network.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.

Securaa

Securaa

Securaa is a comprehensive No Code Security Automation Platform. Smarter Security with Clarity and Control.