News

2024-11-21

Hamas Affiliates Attacking Israel

A group named WIRTE has been identified targeting Israeli infrastructure, as well as the Palestinian Authority, Jordan, Iraq, Saudi Arabia & Egypt.

2024-11-21

Using AI In Classrooms Is A Test Of Public Trust

Trust is a cornerstone for successful AI implementation. There needs to be a gradual build-up of trust rather than a jarring change. By Rob Johnson

2024-11-20

Ireland Orders X, TikTok & Instagram To Cut Terrorist Content

The Irish media commission gave the social media platforms 12 weeks to make “effective, targeted & proportionate” measures to stop terrorist content.

2024-11-21

The Impact Of Geopolitical Dynamics On The Evolving Cybersecurity Landscape

Geopolitical pressures in one part of the world can have an unexpected impact on the cybersecurity of organisations far away. By Bob Hayes

2024-11-20

The Industries Facing The Biggest Cyber Threats

Understanding the sectors most frequently targeted by cybercriminals can offer insights into the breadth & nature of these threats. By John McLoughlin

2024-11-19

Oxford University Reinforces British Cyber Security

CRANE Network: It aims to be a collaborative hub for engagement between researchers and other organisations to prepare the UK for cyber threats. 

2024-11-20

Dealing With Cloud Security Challenges [extract]

The traditional security model, with a network firewall & on-premises network credentials, cannot address the security issues with cloud computing.

2024-11-19

Undersea Communications Cables Cut

Internet cables between Germany and Finland, and Lithuania and Sweden suffered a sudden outage. The affected countries suspect sabotage.

2024-11-19

Musk Sues Microsoft Over OpenAI

Elon Musk is expanding his lawsuit against ChatGPT, charging that OpenAI, along with Microsoft, have violated antitrust law by stifling competitors.

2024-11-15

Imminent Zero-Day Attacks

CISA & NCSC alert warns of an increase in cyber attackers exploiting previously unknown vulnerabilities to compromise enterprise networks.

2024-11-18

Managing API Sprawl: The Growing Risk Of Shadow APIs & How To Mitigate It

Improve your API governance posture and eliminate API security blind spots with a deeply integrated service catalogue. By Miko Bautista

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Networkers

Networkers

Networkers is a global recruitment consultancy helping unite job-seekers and hiring companies across the technology industry.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

RevenueStream

RevenueStream

RevenueStream uses an innovative algorithmic approach to intercept and prevent payment fraud before it even happens.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Infinidat

Infinidat

Infinidat delivers enterprise-proven solutions for data storage, data protection, business continuity, and sovereign cloud storage.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

ICS

ICS

ICS is a leading provider of outsourced IT services, cybersecurity, communications, and distributed workforce solutions throughout the US.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.

SysGroup

SysGroup

SysGroup is an award-winning managed IT services, cloud hosting, and IT consultancy provider.

SOC-E

SOC-E

SOC-E is a leading technology provider for high-availability and deterministic networking, sub-microsecond synchronization and cybersecurity solutions for critical sectors.