News

2024-01-30

Deep Fake Images of Taylor Swift Taken Down

Explicit AI-generated images of Taylor Swift have been removed from X / Twitter in the latest example of the proliferation of fake pornography.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

2024-01-29

Under-Performing Cyber Security Providers

The Financial Services Industry Has A Problem: Many organisations that outsource their cybersecurity lack confidence in the service provider.

2024-01-29

Cyber Security Education From Childhood Is Becoming Vital

Over 70% of children around the world have experienced at least one type of cyber threat online. They need education to protect themselves.

2024-01-27

To Increase Your Pay You Should Acquire AI Skills

Career Opportunities: Employers are willing to pay a 31% premium for IT workers with AI expertise and often they are offering six-figure salaries.

2024-01-27

Major Data Breach Affects Twitter, LinkedIn & Weibo

Personal data of millions of users at risk after cyber security experts uncovered what some are describing as the biggest data breach of all time.

2024-01-26

The Power Of Unified Cloud Protection

Security Service Edge: A modern approach to business security to improve network performance & protection. By John McLoughlin

2024-01-18

Anonymous Sudan Attack London Internet Facility

Unverified DDoS Atack: Russian affiliated hackers claim they have attacked London's Internet Exchange in response to airstrikes in Yemen.

2024-01-24

Ransom Attackers Impersonate Security Researchers

A New Ransom Exploit: Threat actors pretend to help hacked victims by offering to hack the original ransomware gang and delete the stolen data. 

2024-01-24

Cyber Incidents Are The Biggest Risk To Business

Allianz Insurance Barometer: More than a third of companies surveyed name cyber threats as their biggest risk, ahead of business interruption.

2024-01-23

The British Library Gets Back Online

Eleven weeks after a crippling ransom attack the British Library has partially restored services, although full recovery will take another year.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Matias Consulting Group (MCG)

Matias Consulting Group (MCG)

Your Business needs competitive and resilient ICT solutions. MCG defines, deploy & support them enabling you to focus on your core business.

HumanFirewall

HumanFirewall

HumanFirewall makes it possible for every individual to take part in securing their organisation. With HumanFirewall, achieving security has never been easier.

Morphus Information Security

Morphus Information Security

Morphus is an information security company providing Red Team, Blue Team and GRC services as well as conducting research in cybersecurity and threat analysis.

Fischer Identity

Fischer Identity

Fischer Identity provide identity & access management and identity governance administration solutions.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

Certihash

Certihash

Certihash have developed the world’s first blockchain empowered suite of information security tools based on the NIST cybersecurity framework.

Bugv

Bugv

Bugv is a crowdsourcing cybersecurity platform powered by human intelligence where we connect businesses with cyber security experts, ethical hackers, bug bounty hunters from all around the world.

VeriBOM

VeriBOM

VeriBOM is a SaaS security and compliance platform that helps protect you and your customers through automation, documentation, and transparency for every software application you build or run.