Cyber Security

A dangerous moment for cybersecurity

A dangerous moment for cybersecurity

  By Darren Guccione, CEO and Co-founder, Keeper Security  In time..

World’s first cyber catastrophe bond signals significant shift in cybersecurity strategies

World’s first cyber catastrophe bond signals significant shift in cybersecurity strategies

    By Barry Cashman, Regional VP UK, Veritas Technologies In..

Threat intelligence data vital to a successful cyber strategy says Oxylabs

Threat intelligence data vital to a successful cyber strategy says Oxylabs

  As technology progresses, data breaches continue to skyrocket and this isn’t ..

New check point horizon XDR/XPR: A collaborative solution for preventing cyber threats on all fronts

New check point horizon XDR/XPR: A collaborative solution for preventing cyber threats on all fronts

  Check Point Software elevates cybersecurity with a focus on proactive prevent..

Check point software introduces quantum SD-Wan to protect branch offices unifying best security and optimized internet connectivity

Check point software introduces quantum SD-Wan to protect branch offices unifying best security and optimized internet connectivity

  Check Point Quantum SD-WAN provides comprehensive prevention against zero-day..

Check Point Software Releases its 2023 Security Report Highlighting Rise in Cyberattacks and Disruptive Malware

Check Point Software Releases its 2023 Security Report Highlighting Rise in Cyberattacks and Disruptive Malware

    Geo-political conflict triggers increase in cyberattacks and the rise of ‘d..

Top five online dating threats cybercriminals are using this Valentine’s season

Top five online dating threats cybercriminals are using this Valentine’s season

    United Kingdom, 9th February 2023; Love is in the air this Valentine’s Day,..

Rev-Trac and Turnkey Consulting join forces to combat SAP cyber-attacks

Rev-Trac and Turnkey Consulting join forces to combat SAP cyber-attacks

  Secure business critical SAP systems and maintain production stability   Rev-..

Data Privacy Week: Cyber and data privacy experts share their views

Data Privacy Week: Cyber and data privacy experts share their views

As the breadth of cybersecurity threats grow, there is an increasing pressure on org..

TSA: The time to act is now

TSA: The time to act is now

By Rob Pocock, Technical Director, Red Helix As our reliance on communic..

Data privacy day: Keeping your businesses data safe

Data privacy day: Keeping your businesses data safe

By Gary Cheetham, Chief Information Security and Data Protection Officer at Content ..

Cloud-based cyberattacks increased by 48% in 2022, as hackers continue to leverage digital transformation

Cloud-based cyberattacks increased by 48% in 2022, as hackers continue to leverage digital transformation

  Check Point Research (CPR) reports a 48% YoY increase in cloud-based cyberatt..

Pioneering IoT cybersecurity specialist, Cylera, appoints COO to drive domestic and international expansion

Pioneering IoT cybersecurity specialist, Cylera, appoints COO to drive domestic and international expansion

    Pioneering healthcare IoT and medical device cybersecurity specialist, Cyle..

Managing Privacy and Cybersecurity Risks for Successful AI Adoption

Managing Privacy and Cybersecurity Risks for Successful AI Adoption

Libero Marconi   Matthew Negus     S..

What network security professionals need to know about IP address intelligence data’s role in cybersecurity

What network security professionals need to know about IP address intelligence data’s role in cybersecurity

    Try as they might, network security administrators and managed security ser..

2023 Security Trends

2023 Security Trends

By Gary Orenstein, Chief Customer Officer at Bitwarden Cyber security ha..

The Unavoidable Threat: Cybersecurity In 2023

The Unavoidable Threat: Cybersecurity In 2023

It’s hard to overemphasise the danger of cyberattacks in the current day and age. Wi..

One in Four British Small and Medium-Sized Businesses Hit by Ransomware in Past Year

One in Four British Small and Medium-Sized Businesses Hit by Ransomware in Past Year

TEMPE, Ariz. and PRAGUE, January 11, 2023 – Avast, a leading digital security and pr..

How system hardening can address cloud security threats

How system hardening can address cloud security threats

By Dirk Schrader, resident CISO (EMEA) and VP of security research at Ne..

2022 Cybersecurity Census Report Unveils Investment Urgency for UKs Education Sector

2022 Cybersecurity Census Report Unveils Investment Urgency for UKs Education Sector

  One in 10 UK educational institutions are subject to more than 250 attacks ea..

Securing hybrid work for digital food pioneer Flipdish

Securing hybrid work for digital food pioneer Flipdish

  By Arun Kumar J, Regional Director, ManageEngine  The world of work is contan..

What does ‘good’ look like for legal sector IT security?

What does ‘good’ look like for legal sector IT security?

By John Wareing, Legal Security Consultant, Red Helix The legal sector ..

Don’t be fooled by Cyber Scrooges this Christmas 

Don’t be fooled by Cyber Scrooges this Christmas 

  ∙       Christmas is a time for gift giving and spending more time with loved..

How to Escape Bank Account Scams in 2023

How to Escape Bank Account Scams in 2023

  By: Gemma Staite, Threat Analytics Lead at BioCatch   The world of finan..

Mind the Gap: a lack of cyber security skills is leaving SMEs exposed

Mind the Gap: a lack of cyber security skills is leaving SMEs exposed

  Nick Denning, CEO Policy Monitor, looks at the risks and business impacts of ..

Three Ways IP Data Bolsters Cybersecurity

Three Ways IP Data Bolsters Cybersecurity

By Josh Anton, Chief Strategy Officer for Digital Element Cybercrime never sleeps; t..

Is There a way for healthcare providers to prevent cyberattacks from spreading?

Is There a way for healthcare providers to prevent cyberattacks from spreading?

    By Antoine Korulski, Product Marketing Manager, Infinity architecture ..

One Year on from Log4j Vulnerability: Have Lessons been Learned?  

One Year on from Log4j Vulnerability: Have Lessons been Learned?  

    On the anniversary of the Log4j vulnerability disclosure, Check Point ..

What is Identity & Access Management?

What is Identity & Access Management?

  Chris Owen, Director of Product Management at Saviynt Enforcing a secure and ..

Take part in TryHackMe’s Advent of Cyber 2022 to learn cyber security and win up to $40,000 worth of prizes

Take part in TryHackMe’s Advent of Cyber 2022 to learn cyber security and win up to $40,000 worth of prizes

TryHackMe has launched its fourth annual Advent of Cyber event. Advent of Cyber feat..

Fraud rings continue to rise as cybercriminals adopt 24/7 global attack model, reveals Onfido’s 2023 Fraud Report

Fraud rings continue to rise as cybercriminals adopt 24/7 global attack model, reveals Onfido’s 2023 Fraud Report

    Onfido reveals emerging fraud trends from its annual Identity Fraud R..

AlgoSec acquires Prevasio to disrupt the Agentless Cloud Security market

AlgoSec acquires Prevasio to disrupt the Agentless Cloud Security market

    Organizations of all sizes can now protect their cloud-native applicat..

Five things to watch out for in phishing attacks

Five things to watch out for in phishing attacks

By David Higgins, Senior Director at CyberArk’s Field Technology Office..

Targeted ransomware attacks in the UK have more than doubled in 2022

Targeted ransomware attacks in the UK have more than doubled in 2022

    Kaspersky research identifies new techniques and emerging groups  During th..

Quality trumps low-cost impulse buys for 66% of British shoppers this Black Friday Cyber Monday 

Quality trumps low-cost impulse buys for 66% of British shoppers this Black Friday Cyber Monday 

  Despite economic turbulence, 66% of British retailers plan for a big shoppin..

Check Point Software’s Cybersecurity Predictions for 2023: Expect More Global Attacks, Government Regulation, and Consolidation  

Check Point Software’s Cybersecurity Predictions for 2023: Expect More Global Attacks, Government Regulation, and Consolidation  

  Hacktivism, deepfakes, attacks on business collaboration tools, new regulator..

Introducing Gen: The Company to Power Digital Freedom

Introducing Gen: The Company to Power Digital Freedom

  Gen Unites Trusted Brands Including Norton, Avast, LifeLock and Avira TEMPE, ..