FREE TO VIEW


« Back to News

2023-01-20

Sexual Abuse & Harassment Of Women

Sexual harassment is rife in the cyber security industry, with women reporting being groped at events and receiving inappropriate content online. 

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

2023-01-20

Europol Arrest Crypto Currency Fraud Gang

The fraud worked using advertisements posted on social media to lure victims to fake investment websites operated by cyber criminals.

2023-01-19

Cyber Security Issues For The Mobile Industry

Expert Comment: Business leaders from across the Mobile industry share their predictions for cyber security issues in 2023. By Dario Betti

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-18

For Sale: Data Stolen From Volvo 

The stolen data includes internal documents related to telematics, special police vehicles, project management dashboards and car part schematics.

2023-01-18

NHS Is The Most Phished Government Organisation

The British National Health Service is the highest on the list of UK government organisations most frequently impersonated in email scams.

2023-01-17

Cyber Attack On Lisbon Port 

LockBit have claimed responsibility for the attack, saying its ransomware has taken down the port’s website and internal computer systems.

2023-01-17

NATO - AI Cyber Attacks Are A Critical Threat

NATO Cyber Range: Commanders from over 30 countries put their skills to the test on how they would defend their country in a simulated attack.

2023-01-17

Three Steps To Protect Your Organisation From Wiper Malware

How to Avoid A Wipeout: No matter what cybercriminals may do, a robust backup and recovery plan will keep your data secure. By Florian Malecki

2023-01-16

The Internet of Vehicles - Connected Cars

IoV: Some day soon, every car will become connected, with warning sensors, road hazard detections, and vehicle-to-pedestrian communication.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

NPCore

NPCore

NPCore is specialized in defense solution against unknown APT and Ransomware and provides two-level defense on network and endpoint based on behavior.

NRI Secure Technologies

NRI Secure Technologies

NRI SecureTechnologies is a Cybersecurity group company of the Nomura Research Institute (NRI) and a global provider of next-generation Managed Security Services and Security Consulting.

Identillect Technologies

Identillect Technologies

Identillect Technologies provide a user-friendly secure email solution to protect critical information, with an emphasis on simplicity.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

INVISUS

INVISUS

INVISUS protects businesses against the latest cyber risks – including business and employee identity theft, data breaches, and cybersecurity compliance.

Guardian Digital

Guardian Digital

Guardian Digital makes email safe for business. Threat-ready business email protection. Fully supported.

Tailscale

Tailscale

Tailscale is a VPN service that makes the devices and applications you own accessible anywhere in the world, securely and effortlessly.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

Auxilion

Auxilion

Auxilion is an award-winning provider of consulting and IT support services, technologies and consulting for public and private organisations in the UK and Ireland.

MiDO Technologies

MiDO Technologies

MiDO Technologies has a mission to change the narrative around digital enabling tools on the continent of Africa and prepare African youth.

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.

DataBee

DataBee

DataBee, a Comcast Company, brings to market an enterprise-ready security data fabric that delivers connected compliance and security data that works for everyone.