News

2024-06-18

Chinese Hackers Have A Global Impact

Chinese state-sponsored hackers gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw.

2024-06-18

Taming Aggressive Algorithms

Child Protection: The British regulator has new rules to protect children online, part of a draft Children's Safety Codes of Practice. By David Varney

2024-06-17

Instagram & Facebook Are Addictive For Children

Negative Effects: The EU is investigating Meta's Facebook and Instagram social media platforms over concerns for children's mental health.

2024-06-14

The Internet Is Good For You

Internet Access Improves Personal Well-Being: People with Internet access or actively using the Internet report greater levels of life satisfaction.

2024-06-13

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit

EC-Council's Pro-Bono Cyber AI Toolkit: Setting New Standards for Cybersecurity Training in the US for its Certified Members.

2024-06-14

Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

An average cybersecurity stack comprises 32 solutions, highlighting the need for consolidated platforms to deal with growing complexity.

2024-06-13

AI-Generated Misinformation - A Growing Concern For 2024 Elections

Cybersecurity & Trust: Concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election.

2024-06-13

Protecting Data In The Remote Working Era

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-12

Cyber Criminals Do Not Care Who Falls Victim

Attacks on Santander and NHS London demonstrate why cyber insurance should be part of every business' resilience strategy. By Marc Rocker

2024-06-10

Britain's Cybersecurity Business Is Booming

British Cyber Security Sectoral Analysis: The successful growth of the domestic cybersecurity industry is having a nationwide impact.

2024-06-12

Kinsing Malware Attacks Analysed

A Critical Threat: Kinsing targets cloud infrastructure, exploiting misconfigurations to rapidly spread attacks across numerous popular applications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Conscia

Conscia

Conscia provides IT infrastructure solutions and 24/7 services in network, data center, security and mobility.

Ideagen

Ideagen

Ideagen provides information management, safety, risk and compliance software solutions that allow organisations to achieve operational excellence, regulatory compliance and reduce risk.

Cansure

Cansure

Cansure is a leading insurance provider in Canada offering a broad range of property & casualty insurance solutions including Cyber & Data Breach insurance.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

FireCompass

FireCompass

FireCompass SAAS platform helps CISOs & Security Teams in continuous risk assessment by mapping your attack surface and knowing the “unknown unknowns”.

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers (PwC)

PricewaterhouseCoopers is a multinational professional services network of firms headquartered in London, United Kingdom and operating in 157 countries.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.

Rebellion Defense

Rebellion Defense

Rebellion Defense is a technology company developing advanced software to ensure mission-critical organizations stay ahead of emerging threats.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

rThreat

rThreat

rThreat is a cloud-based SaaS solution that challenges your cyber defenses using real-world and custom threats in a secure environment, ensuring your readiness for attacks.