News

2022-01-26

Online Daters Must Protect Themselves Against Fraud

Looking For Love: Online Dating has caused heartbreak for many, with over £90 million stolen through fraud and deception last year.

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Ransomware Attack On Moncler

Italian luxury brand Moncler refused to pay ransom when its order processing system was disabled, resulting in a vengeful dump of employee data.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Auto-Redirects: A Harmful Detour

Auto-redirects are a problem that many web users don't know about and are associated with a loss of privacy, malvertising, malware and more.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-24

SAAS Malware Used To Attack Crypto Wallets

Cheap and easy-to-use malware available on Dark Web markets means that it has never been easier for cyber criminals to steal crypto currencies.

2022-01-24

Red Cross Hacked - Half A Million Victims At Risk

Hackers targeted an external server company that stores names, locations & contact information gathered from 60 Red Cross societies worldwide.

2022-01-24

NATO & Ukraine Agree Deeper Cyber Co-operation

The new agreement gives Ukraine access to NATO’s malware information sharing platform and help to identify Ukrainian cyber security training needs.

2022-01-22

The Next 9/11 Will Be A Cyber Attack

As tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is not a matter of if, but when.

2022-01-21

Is Cyber Training Fit For Purpose?

Tick A Box: Just telling your people to use stronger passwords, look out for suspicious links and check emails from new contacts isn’t enough.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

AEI Cybersecurity

AEI Cybersecurity

AEI brings together companies, Research Centres, Universities, and other organizations interested in promoting new cybersecurity technologies.

Acuant

Acuant

Acuant is a leading global provider of identity verification, regulatory compliance (AML/KYC) and digital identity solutions.

DFI

DFI

DFI is a global leading provider of high-performance computing technology across multiple embedded industries.

Take Five

Take Five

Take Five is a national campaign offering straight-forward, impartial advice that helps prevent email, phone-based and online fraud – particularly where criminals impersonate trusted organisations.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Saudi Information Technology Company (SITE)

Saudi Information Technology Company (SITE)

SITE is a forward-thinking enterprise, which aims at revitalizing Saudi Arabia’s digital infrastructure, cybersecurity, software development, and big data and analytics capabilities.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

Autobahn Security

Autobahn Security

Autobahn Security is a growing team of 80+ experts from 25+ nationalities, established in 5 countries. We’re working hard to make Autobahn Security the No. 1 solution for improved hacking-resilience.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

Vambrace Cybersecurity

Vambrace Cybersecurity

Vambrace is an experienced cybersecurity consultancy and operations outsourcer helping you to secure your business in an increasingly-hostile cyber environment.

Black Alps

Black Alps

Black Alp's mission is to promote cybersecurity through the organization of dedicated events.

Grey Market Labs

Grey Market Labs

Grey Market Labs is a special place. It is a data privacy and security skunkworks.