News

2024-07-11

Half Of Employees Don’t Report Security Mistakes

Despite increased security awareness training, more than half of cyber security professionals share concerns over security behaviours.

2024-07-09

Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware

Velvet Ant: A command injection exploit that allows an authenticated, local attacker to execute arbitrary commands without syslog alert messages.

2024-07-05

Inside The Mind Of A CISO

The AI Express: CISOs are divided in their attitude over what AI will mean for their organization and their own roles. By Nick McKenzie 

2024-07-05

UK vs. US: The Artificial Intelligence Landscapes Compared

Innovation Vs Pragmatism: While the US and UK are at the forefront of AI development, their approaches diverge significantly. By Bill Conner

2024-07-02

Cyber Threats To The British Elections

Imminent General Eelection: Threat actors could seek to exacerbate domestic political divisions regarding the primary electoral issues.

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-03

London Hospitals Were Attacked By Russian Hackers

An attack on the NHS was accurately predicted months before Russia's Qilin hackers struck London hospitals in a supply chain exploit.

2024-07-02

RCE Vulnerability In OpenSSH Server

OpenSSHion: An old vulnerability has resurfaced and millions of systems are exposed to unauthorised control, needing urgent mitigation.

2024-07-08

AI Has The Power To Transform Healthcare Cyber Security

The British healthcare sector is set for transformation driven by advances in Artificial Intelligence - can it also protect sensitive data?

2024-07-02

Australian Banks Suffering Intense Cyber Attacks

Australia's big four banks are undergoing constant cyber attacks as criminals deploy new purpose-built malware targeting mobile phone users.

2024-07-07

2024 State Of Network Security

Security, Continuity & Compliance: Identifying key trends in cloud platform adoption, deployment of firewalls SD-WAN and SASE implementation.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

GovernmentCIO

GovernmentCIO

GovernmentCIO was founded with a single purpose: to transform government IT. We are thought leaders in data analytics, machine learning, cybersecurity and IT transformation.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

OpenAI

OpenAI

OpenAI is an AI research and deployment company dedicated to ensuring that general-purpose artificial intelligence benefits all of humanity.

Cynch Security

Cynch Security

Cynch Security are passionate about building a world where every business is resilient to cybersecurity risks, no matter what their size.

Exertis Cybersecurity

Exertis Cybersecurity

Exertis Cybersecurity is a sub-division of Exertis Enterprise. We provide market-leading cybersecurity solutions that help to address the cybersecurity challenges that organisations face today.