Adarma Collaborates with Scottish Enterprise to Unveil Neurodiversity Strategy

Adarma Collaborates with Scottish Enterprise to Unveil Neurodiversity Strategy

Adarma has today announced its neurodiversity strategy in partnership with Scottish Enterprise, Scotland’s national economic development agency. The strategy supports Adarma’s continued commitment to attract, support, and empower people from diverse backgrounds into the cybersecurity sector, which will help combat the well-documented skills shortage in the cybersecurity sector. Adarma employs over 300 people and believes … Read more

ISC2 Collaborates with IBM to Launch Entry-Level Cybersecurity Certificate

ISC2 Collaborates with IBM to Launch Entry-Level Cybersecurity Certificate

ISC2 – the world’s leading nonprofit member organization for cybersecurity professionals – announced a partnership with IBM (NYSE: IBM) to launch the IBM and ISC2 Cybersecurity Specialist Professional Certificate. The new entry-level program, available exclusively via the Coursera platform, is designed to prepare prospective cybersecurity professionals for a career in the field. By completing a joint 12-course series, … Read more

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 2

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 2

The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so many exceptional nominees. MIWIC24 is sponsored by ThinkCyber, BT and Plexal, in partnership with WiCyS … Read more

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 3

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 3

The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so many exceptional nominees. MIWIC24 is sponsored by ThinkCyber, BT and Plexal, in partnership with WiCyS … Read more

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 1

Meet This Year’s Most Inspiring Women in Cyber Nominees: Part 1

The nominations for the Most Inspiring Women in Cyber awards are out! It’s always wonderful to read about the incredible women in our industry, who are making fantastic contributions and paving the way for others. This year we had so many exceptional nominees. MIWIC24 is sponsored by ThinkCyber, BT and Plexal, in partnership with WiCyS … Read more

The Cyber Scheme launches training course for IoT/ICS security testers

The Cyber Scheme launches training course for IoT/ICS security testers

The Cyber Scheme has announced availability of a new CSII Practitioner Training Course that has been developed as a comprehensive IoT/ICS hacking course. The aim of the course is to teach candidates all the skills they need to securely test and assess connected systems and devices in consumer, industrial, and critical infrastructure environments.  It is … Read more

Salt Security API Protection Platform Now Available for Purchase in the CrowdStrike Marketplace

Salt Security API Protection Platform Now Available for Purchase in the CrowdStrike Marketplace

Today, API security pros Salt Security have announced that the Salt Security API Protection Platform is now available for purchase in the CrowdStrike Marketplace. Salt Security integrates with the industry-leading CrowdStrike Falcon® XDR platform to provide customers with best-of-breed API runtime monitoring and AI-driven insights for a 360-degree view of API security risks for effective threat … Read more

“Dr. Zero Trust” Chase Cunningham Joins Keeper Security Public Sector Advisory Board

“Dr. Zero Trust” Chase Cunningham Joins Keeper Security Public Sector Advisory Board

Today, Keeper Security have announced the appointment of Dr. Chase Cunningham to its Public Sector Advisory Board. Cunningham’s appointment reflects Keeper Security’s commitment to zero-trust security. Keeper’s early adoption of zero-trust architecture has become a model for national security and cybersecurity organisations preparing to invest in and implement zero trust. As an advisory board member, … Read more

Cyber gaps in the supply chain — Bank of America breached in another vendor cyberattack

Cyber gaps in the supply chain — Bank of America breached in another vendor cyberattack

Third-party cyber-attacks remain one of the most significant threats facing organisations across the globe. Most recently, Bank of America, a multinational investment banking and financial services corporation, began notifying customers that a November 2023 hack against one of its service vendors resulted in the exposure of personally identifiable information (PII).  The breach occurred following a … Read more

The Channel can help SMEs protect themselves from increasing security threats

The Channel can help SMEs protect themselves from increasing security threats

Recent reports indicate that SME resellers specialising in security are optimistic about the future, expecting a better year ahead than the challenges they faced in the previous 12 months.  With increasing cyber threats and the need for secure and reliable solutions, these resellers are poised to provide valuable services to businesses seeking to safeguard their … Read more

Own Company Unveils New Channel Partner Program

Own Company Unveils New Channel Partner Program

Own Company, a leading SaaS data platform, today announced the launch of a global Channel Partner Program aimed at empowering resellers and system integrators to proactively prevent their customers from losing mission-critical data and metadata. With automated backups and rapid, stress-free recovery, Own partners will be equipped with the essential resources, skills, and support necessary … Read more

Quantum computing: The data security conundrum

Quantum computing: The data security conundrum

One of the biggest challenges of digital technology today is around security systems and data. In response to this, sophisticated algorithms have been designed to encrypt data and protect it through frameworks known as symmetric cryptography. While this has proven successful, advancements in quantum computing – which utilises quantum mechanics to solve complex problems faster … Read more