FREE TO VIEW


« Back to News

2023-01-03

Meta Pays $725M To Settle Facebook Privacy Suit

Facebook’s parent company Meta has agreed to settle a US lawsuit following 2018 revelations that Facebook illegally shared data of 87m users.

2022-12-31

Looking Back - Top 10 Most Read Articles Of 2022

2023 Loading: A review of the most popular stories on this website in 2022 reveals two main trends - Cyber Resilience and Cyberwar in Ukraine.

2022-12-31

From AI to ESG: Key Security Technology Trends Of 2023

Upheaval Or Realignment? The six key technology trends that are set to impact the security sector in the coming year. By Johan Paulsson

2022-12-30

IT Downtime Is Growing As Digital Transformation Speeds Up

Visibility Is Key: Creating observability across the entire IT infrastructure allows organisations to mitigate the risk of downtime. By Matt Tuson

2022-12-30

Critical Infrastructure: A Flashing Beacon For Cybercrime

Cybercriminals are fully aware of the impact of disruption on vital services, not just financially, but on public confidence. By Deryck Mitchelson

2022-12-29

US Bans Government Users From Using TikTok

The Senate has passed a bill that bans federal employees from using the Chinese-owned TikTok app on devices provided by the government. 

2022-12-29

France Fines Microsoft For Privacy Breaches

Fined $64 Million: Microsoft's search engine Bing was operating with a system that did not allow users to easily get out of cookie collection.

2022-12-29

Four Major Cyber Attacks In 2022: How To Not Repeat History In 2023

High Profile Attacks On Twitter, Medibank, Optus & Ronin: How can tools such as Attack Surface Management prevent hacking from taking place?

2022-12-28

Ukraine’s Military Intelligence Hit By Cyber Attacks

Battlefield Awareness: Ukrainian security services confirm that its Delta military intelligence system has been hit by cyber attacks.

2022-12-27

Preventing Insider Threats In Kubernetes Clusters

Secure Your Kubernetes Clusters From Inside Threats. The basics of insider threats and how to prevent it in Kubernetes. By Gilad David Mayaan

2022-12-23

Irish Health Service Ransom Attack Will Cost Ireland As Much As €100m

A malicious Excel file attached to a phishing email which resulted in an IT systems shutdown has caused €80 million in damages and counting.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

CERT-PY

CERT-PY

CERT-PY is the national Computer Emergency Response Team for Paraguay.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

NNIT

NNIT

NNIT​ is one of Denmark’s leading consultancies in IT development, implementation and operations, including cyber security.

Shadowserver Foundation

Shadowserver Foundation

Shadowserver Foundation aims to improve internet security by raising awareness of compromised servers, malicious attackers and the spread of malware.

Valtori

Valtori

Government ICT Centre Valtori provides sector-independent ICT services for the central government, while taking into account the special requirements related to security and preparedness.

Yaana Technologies

Yaana Technologies

Yaana is a leading provider of intelligent compliance solutions including lawful interception, data retention & disclosure, and advanced security analytics.

Macquarie Telecom Group

Macquarie Telecom Group

Macquarie Telecom is Australia's datacentre, cloud, cyber security and telecom company for mid-large business and government customers.

Nostra

Nostra

Nostra are a next generation managed services provider with a constant focus on Security and Business Continuity.

Orbus Software

Orbus Software

Orbus develops, markets and sells enterprise software which helps large, blue chip and government organisations across the globe to achieve digital transformation outcomes.

QA Consultants

QA Consultants

QA Consultants is North America’s largest software quality engineering services firm, an award-winning onshore provider of software testing and quality assurance solutions.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.

Strobes Security

Strobes Security

Strobes is among the world’s first cybersecurity platforms specifically designed for end-to-end continuous threat exposure management.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.