FREE TO VIEW


« Back to News

2025-06-09

Securing Spend To Address API Attacks

Despite their critical importance, APIs are still failing to be configured correctly or adequately tested during development. By Mohammad Ismail

2025-05-28

Failure Happens, But Recovery Can Be Managed Intelligently

Better resilience & response to disruption requires equal parts critical thinking, culture, and practice, as much as technology. By Eduardo Crespo

2025-05-29

How Ransomware's Industrialization Impacts SOC Operational Tempo

The latest evolution of the ransomware industry is prompting security teams to adopt more modern tools & more agile workflows. By Matt Muller

2025-05-21

The Impact Of The Internet On Modern Society [extract]

Can people, businesses & policy-makers adapt fast enough to address the challenges that arise from collective reliance on the Internet?

2025-05-26

The Future Of Passwords In Retail

Cyber criminals know passwords are a weak-link they can exploit. Retailers must take action to prevent themselves falling victim. By Doriel Abrahams

2025-05-20

Insurers Are Now Covering AI Malfunction Losses

The intersection of AI and insurance is evolving fast, offering efficiencies, but also demanding the careful management of risks & liabilities.

2025-05-16

Iran Suffers A Large Scale Attack On Critical Infrastructure

A mystery attack appears to have targeted Iran’s controversial nuclear program to enrich uranium and enable nuclear weapon development.

2025-05-15

Police Investigate Fake Council Tax Fraud

Cyber criminals have used a fake web address to divert payment of propery tax bills sent to 300,000 householders in Northern Ireland.

2025-05-20

Security Performance Metrics Fall Short

Align Security Metrics With Your Business Goals: As research reveals flaws in security performance, here are 4 ways to shift your team’s focus.

2025-05-20

Dior’s Client Data Has Been Breached

Contact Information, Purchases Data & Preferences Stolen: Luxury French fashion brand Dior is the latest retail company to be attacked.

2025-05-19

Kill Switches Secretly Installed In Solar Panels

Remotely Deactivated Power Inverters: Chinese made “kill switches” have been discovered hidden in solar panel controls, are an urgent warning.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

SentryBay

SentryBay

SentryBay is the global leader in preventative endpoint isolation protection. We protect remote, BYOD and corporate endpoints so they can safely and securely connect with your corporate network.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

PixelPlex

PixelPlex

PixelPlex is a blockchain and custom software development company with offices and developers in New York, Geneva, and Seoul.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

One Step Secure IT

One Step Secure IT

One Step provide Managed IT Services, Cybersecurity Protections, and Compliance to businesses in the USA nationwide.

Prefactor

Prefactor

Prefactor was built because the problem of authenticating and authorizing users continues to be a battle engineers face globally.