Cybersecurity

Mitigating Data Breach Risks: How iDox.ai Aims to Make Data Protection Smarter

Mitigating Data Breach Risks: How iDox.ai Aims to Make Data Protection Smarter

Data breaches often feel like one of those problems that happen to other organizations until they happen to you. In an era where information is the ..

The role of AI in 2024’s cybercrime landscape 

The role of AI in 2024’s cybercrime landscape 

Last year, AI took the technology sector by storm, with businesses across the industry beginning to implement the technolo..

Unleashing the power of ChatGPT to combat fraud and shape the future of security

Unleashing the power of ChatGPT to combat fraud and shape the future of security

Open AI’s ChatGPT has engulfed the world in a frenzy thanks to its sophisticated Large Language Model that offers pr..

UK small business growth held back by cost-of-living, skills shortage and increased cyber threat

UK small business growth held back by cost-of-living, skills shortage and increased cyber threat

    New research from IONOS, the leading European digitalisation partner for small and medium-sized businesses, has found that wh..

Ontinue Strengthens Global SOC and security leadership with addition of Veteran Sophos and Tiberium Cybersecurity experts

Ontinue Strengthens Global SOC and security leadership with addition of Veteran Sophos and Tiberium Cybersecurity experts

  New Leadership Expands Ontinue’s World-Class SOC Team, Driving and Accelerating Ontinue’s Global Growth Ontinue, the managed de..

Kaspersky releases tool for decrypting Conti-based ransomware

Kaspersky releases tool for decrypting Conti-based ransomware

    Kaspersky has published a new version of a decryption tool that helps victims of a ransomware modification based on previousl..

Check Point Software´s Prevention-First Approach to Cyber Security Emphasizes Comprehensive, Consolidated and Collaborative Solutions as the Requirement to Achieve Cyber Resilience

Check Point Software´s Prevention-First Approach to Cyber Security Emphasizes Comprehensive, Consolidated and Collaborative Solutions as the Requirement to Achieve Cyber Resilience

    Check Point CEO Gil Shwed highlights the increasing importance of artificial intelligence in defending evolving networks and ..

Professor Cameron “Buck” Rogers Joins CyberScale’s New Advisory Board 

Professor Cameron “Buck” Rogers Joins CyberScale’s New Advisory Board 

    CyberScale, a specialist Cyber Security Consultancy, based in Norwich has appointed Professor Cameron ‘Buck’ Rogers as the fi..

International Friendship Day: Could Your Cybersecurity Mistakes Also Put Your Loved Ones at Risk?

International Friendship Day: Could Your Cybersecurity Mistakes Also Put Your Loved Ones at Risk?

  The mistakes we make on our personal accounts and profiles can have a direct impact on the cybersecurity of our closest contact..

Cybersecurity market leader Phoenix Datacom relaunches as ‘Red Helix’

Cybersecurity market leader Phoenix Datacom relaunches as ‘Red Helix’

  Phoenix Datacom, a market leader in UK cybersecurity, has today rebranded as ‘Red Helix’, marking the evolution of the business..

BOM IT Solutions appoints David Trump as CTO to spearhead   the company’s new cyber security division

BOM IT Solutions appoints David Trump as CTO to spearhead  the company’s new cyber security division

  14th July 2022, South West, Bristol: BOM IT Solutions in Clue House Bristol has appointed David Trump as Cyber Security Solutio..

CyberArk Launches Secrets Hub for AWS Secrets Manager

CyberArk Launches Secrets Hub for AWS Secrets Manager

CyberArk Secrets Hub provides developers with a simple, secure and consistent way to access secrets on AWS Enables enterprises..

Cyber Threats Within Digital Ecosystems May Be an Enterprise Blind Spot, Reveals New Study from TCS

Cyber Threats Within Digital Ecosystems May Be an Enterprise Blind Spot, Reveals New Study from TCS

  Tata Consultancy Services’ Risk and Cybersecurity Study among 600 Cyber Executives Highlights the Most Pressing Cybersecurity ..

Okta for Good Launches New Grant Portfolio to Improve Cybersecurity for Nonprofits

Okta for Good Launches New Grant Portfolio to Improve Cybersecurity for Nonprofits

   New Nonprofit Cybersecurity Portfolio commits  $1M+ as part of Okta’s 3-year Nonprofit Technology Initiative SAN FRANCISCO — J..

Fortinet Global Survey Uncovers Critical OT Security Challenges

Fortinet Global Survey Uncovers Critical OT Security Challenges

  93% of OT Organisations Experienced an Intrusion in Past 12 Months, and 78% Experienced More than Three London, 15th June, 2022..

Iranian Spear Phishing Operation Targets Former Israeli Foreign Minister, Former US Ambassador to Israel, Former Israeli Army General and Three other High-Profile Executives

Iranian Spear Phishing Operation Targets Former Israeli Foreign Minister, Former US Ambassador to Israel, Former Israeli Army General and Three other High-Profile Executives

  Check Point Research (CPR) exposes an Iranian spear-phishing operation targeting high-profile Israeli and US executives. The at..

Genesys Cloud CX achieves Cyber Essentials certification  

Genesys Cloud CX achieves Cyber Essentials certification  

  London – 14-June 2022 – Genesys®, a global cloud leader in customer experience orchestration, has announced the Genesys Cloud C..

Snowflake Launches New Cybersecurity Workload to Detect and Respond to Threats with the Data Cloud

Snowflake Launches New Cybersecurity Workload to Detect and Respond to Threats with the Data Cloud

  Snowflake’s new Cybersecurity workload provides a unified, secure, and scalable data platform for helping security teams elimin..

Password Managers Go Mainstream and Reveal Need for C-Suite Driven Security Consistency

Password Managers Go Mainstream and Reveal Need for C-Suite Driven Security Consistency

IT decision makers rely on tools that allow them to work faster, safely, but gaps remain in adhering to security best practices London..

Security Flaws in Smartphone Chip could have led Hackers to Eavesdrop on Android Users

Security Flaws in Smartphone Chip could have led Hackers to Eavesdrop on Android Users

Check Point Research (CPR) identifies security flaws in the processor chip found in 37% of the world’s smartphones. Left unpatched, a ..