News

2024-08-13

Hackers Stealing Data Using Cisco Smart Install

CISA Warning: Hackers are exploiting an obsolete Cisco Smart Install feature to get access to sensitive data using readily available protocols.

2024-08-20

Ransomware Attack Trends & The True Costs To Victims [extract]

Ransomware attacks pose significant risks to businesses worldwide, with cyber criminals employing increasingly sophisticated tactics to extort payments.

2024-08-07

The Role of VPNs In The World Of Cybersecurity

Safeguarding Sensitive Information: VPNs offer a layer of protection which helps users to navigate the Internet with greater security and anonymity.

2024-08-12

British Nuclear Plant Has Serious Cyber Security Failures

Multiple investigations revealed staggering vulnerabilities that exposed the operation to a wide range of potentially devastating cyber attacks.

2024-08-12

Microsegmentation In 2024: Trends, Technologies & Best Practices

Enhanced Security: By segmenting the network, security policies can be enforced at more precise levels, making it harder for threats to propagate.

2024-08-13

Ransomware Attack Trends & The True Costs To Victims

Ransomware attacks pose significant risks to businesses worldwide, with cyber criminals employing increasingly sophisticated tactics to extort payments.

2024-08-09

GenAI & Cybersecurity: The New Frontier Of Digital Risk

Understanding the risks of adopting GenAI is crucial for businesses seeking to harness its power while safeguarding their assets. By Pravesh Kara

2024-08-09

British Government Warned To Prioritise Cyber Security

‘Wake Up’: Britain is warned it needs to take further measure to protect vulnerable infrastructure and prevent catastrophic system failures.

2024-08-09

Elon Musk Promotes Fake News About British Rioters

Under Elon Musk's ownership, X / Twitter has had a succession of controversies, including accusations of promoting fake news & hosting harmful content.

2024-08-07

New British Government Cuts £1.3bn Technology Investment Plan

Left In The Lurch: The new Labour government in Britain has cancelled £1.3bn of funding for investment in computer technology and AI projects.

2024-08-06

Four Security Risks Posed by AI Coding Assistants

AI coding assistants offer major benefits by enhancing productivity and automating repetitive tasks. They also pose security & ethical risks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Lirex

Lirex

Lirex offer consulting and outsourcing services, complete design, construction and maintenance of ICT solutions and systems including cybersecurity.

SaltStack

SaltStack

SaltStack develops award-winning intelligent IT automation software. We help businesses more efficiently secure and manage all aspects of their digital infrastructure.

OXO Cybersecurity Lab

OXO Cybersecurity Lab

OXO Cybersecurity Lab is the first dedicated cybersecurity incubator in the Central & Eastern Europe region.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

ImpactQA

ImpactQA

ImpactQA is a global leading software testing & QA consulting company. Ten years of excellence. Delivering unmatched services & digital transformation to SMEs & Fortune 500 companies.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

Pristine InfoSolutions

Pristine InfoSolutions

Pristine InfoSolutions is a global IT services and Information Security Company focused on delivering smart, next-generation business solutions.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

PolySwarm

PolySwarm

PolySwarm is a crowdsourced threat intelligence marketplace that provides a more effective way to detect, analyze and respond to the latest threats.

HWG

HWG

HWG is a company specialized in providing cyber security solutions and consulting services.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.