News

Please log in to view this article. Login now
2025-06-30

Supercharge AI - GPU Power Meets Cyber Resilience

The future of AI infrastructure lies in high-throughput, low-latency storage systems built around object storage paradigms. By Paul Speciale

2025-06-30

Cybersecurity Threats In The Automotive Industry

Data breaches, ransomware & emerging vulnerabilities expose the need for stronger defences, as vehicles become more digitally integrated.

2025-06-30

Iranian Hackers Attack After US Air Strikes

Iranian hackers are reported to have hit US banks, defence contractors and oil industry companies after the US attacks on Iranian nuclear facilities.

2025-06-30

The UK’s Software Security Code Of Practice Is More Than Just A Guidance

Organisations risk legal action within 12 months if they don't act now to strengthen their systems and prevent attacks. By Andreas Vermeulen

2025-06-30

US Seeks To Ban 'Adversarial AI'

US legislators are proposing a law to block Chinese AI systems like DeepSeek over the perceived risks to national security & data privacy.

2025-06-28

Notorious Hacker ‘IntelBroker’ Arrested

British Hacker Charged In Global Cybercrime Scheme: Law enforcement agencies are making progress by targeting Dark Web cybercrime forums.

2025-06-27

Cybersecurity: The New Catalyst For SMB Growth 

Threats can become opportunities as cyber strategies shift from defensive necessity to a business catalyst, propelling growth. By Adriaan Bekker

2025-06-27

Sixty One Million Verizon Records Found On Web Forum

Alleged Verizon Data Breach: The exposed data reportedly includes first and last names, gender, dates of birth and tax IDs.

2025-06-25

Closing The AI Divide - Mitigating Cyber Threats

AI-Powered Threats: A digital divide looms between those capable of defending against such threats, and those that can’t. By Dr. Megha Kumar

2025-06-25

NATO Allies Pledge 1.5% Of GDP To Boost Cybersecurity & Protect Critical Infrastructure

Mounting geopolitical tension and the growing sophistication of cyber threats are driving a significant shift in how NATO defines defence expenditure.

2025-06-25

Healthcare Under (Cyber) Attack: What You Need to Know

Recent breaches underline the growing data leak threats experienced in Healthcare, and what the industry & cybersecurity experts are doing about it.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU Arab Regional Cyber Security Center (ITU-ARCC)

ITU-ARCC acts as ITU’s cybersecurity hub in the Arab Region localizing and coordinating cybersecurity initiatives.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

SQN Banking Systems

SQN Banking Systems

SQN Banking Systems fraud detection software products are a critical step towards overcoming the growing problem of fraud across the various payment channels.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

Red Piranha

Red Piranha

Red Piranha's Crystal Eye Unified Threat Management Platform is designed for Managed Service Providers and corporations that need extreme security that is both easy to use and affordable.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

Progress Partners

Progress Partners

Progress Partners is a corporate advisory firm that works with buyers and sellers of emerging growth companies to complete M&A or private placement transactions. Our sectors include cybersecurity.

Persona Identities

Persona Identities

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Metabase Q

Metabase Q

Metabase Q protects you from financial and reputational losses with more efficient and intelligent cybersecurity, using the best worldwide in technologies, processes and specialists.

Telindus

Telindus

Telindus is the strategic IT partner for the flexible organization of the future. We build optimal IT infrastructure with four components: networking, cloud, cybersecurity and data & AI.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.