News

2024-09-23

Combating Cyber Attacks With Threat Intelligence 

Navigating Cybersecurity: Threat intelligence has a key role in reducing risks and can be integrated with other tools to reach better solutions.

2024-09-12

Which US States Are Most At Risk From Cyber Attacks? 

Colorado, New York, Nevada & California Top The List: Three out of four companies in the US are found to be at risk of a material cyber attack.

2024-09-17

Attack On Transport For London Exposed Passenger Bank Details

Teenager Arrested: 30,000 staff passwords exposed, plus bank account details of 5,000 passengers, including account numbers and sort codes.

2024-09-17

Who Are The Top 10 Cyber Security Companies? [extract]

The business of cyber security is consolidating with major participants making power moves like acquisitions & innovation. Big money is at stake.

2024-09-13

The US Education Sector Is Under Siege

Over 75% of organisations in the US education sector detected a cyber attack on their infrastructure over the last year, up from 69% in 2023.

2024-09-16

Who Are The Top 10 Cyber Security Companies?

The business of cyber security is consolidating with major participants making power moves like acquisitions & innovation. Big money is at stake.

2024-09-16

What Android Users Need To Know About New Malware

SpyAgent: A new Android mobile malware which targets mnemonic keys by scanning your device for recognisable images. By Oliver Devane

2024-09-10

The Impact Of 5G On iGaming

5G technology accelerates data transfer speeds, resulting in higher quality gaming visuals and more in-depth mechanics for casino games.

2024-09-16

Mental Health Provider Has Exposed Patient Data

No Password Protection: The 5.3 terabytes of exposed data included critical personal details about patients, going far beyond therapy sessions.

2024-09-16

Russian Hackers Exploit Mobile Browser Vulnerabilities

Researchers identify multiple campaigns exploiting Internet browsers flaws using methods very like those first developed by NSO Group.

2024-09-17

2024 US Presidential Election: Nation State Cyber Threats

As the country prepares to vote, hostile nation state actors are seeking to capitalize on US instability to meet pre-defined objectives. By Craig Watt 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Spiceworks

Spiceworks

Spiceworks provide a range of free apps for IT professionals including network inventory, network monitor, and help desk.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

BetterCloud

BetterCloud

BetterCloud puts IT in control of the modern workplace through user lifecycle management, data discovery, and IT and security automation purpose-built for SaaS.

Niksun

Niksun

Niksun's forensics-based cyber security and network performance monitoring products provide customers with actionable insight into security threats, performance issues, and compliance risks.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Global Lifecycle Solutions EMEA (Global EMEA)

Global Lifecycle Solutions EMEA (Global EMEA)

Global EMEA provides full lifecycle services to corporate Clients covering procurement, configuration, support, maintenance and end-of-life asset management.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

CyPhyCon

CyPhyCon

CyPhyCon is an annual event exploring threats and solutions to cyber attacks on cyber-physical systems such as industrial control systems, Internet of Things and Industrial Internet of Things.

Securosys

Securosys

Securosys is a technology company dedicated to securing data and communications. We develop, produce, and distribute hardware, software and services that protect and verify data and their transmission

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Certo Software

Certo Software

Certo are trusted experts in mobile security. At Certo, mobile security is not an afterthought, it’s what we do.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

IS4IT Kritis

IS4IT Kritis

IS4IT is your partner for the successful planning, introduction and implementation of company-specific information security concepts.

Xmore AI

Xmore AI

Xmore AI, an emerging disruptor in our incubation, is building AI models to optimize and secure IT with the mission of increasing efficiency and reducing costs.