News

2023-01-26

NCSC Alert: British Journalists & Politicians Are Hacking Targets

Russian and Iranian government-linked hackers are focusing on British politicians & journalists, aiming to get access to their email accounts.

2023-01-25

Preventing Ransomware Attacks Begins With You

Don't Forget To Protect Your Data: What business owners need to know about identifying attacks and keeping their employees safe.

2023-01-25

Coming Your Way - The Top Cyber Crimes In 2023

A sharp increase in cyber crime is becoming visible, affecting a variety of industries & organisations in many ways, some old and some new.

2023-01-25

Who Foots the Bill For A Data Breach? 

Data breach is almost inevitable, yet many companies and their MSPs are unclear about their legal & financial obligations. By Simon Pamplin

2023-01-25

Five Application Security Predictions For 2023

The shift to cloud native applications is a driver of significant opportunities and challenges in the area of cybersecurity. By Dean Agron

2023-01-24

Ukraine Signs Cyber Security Deal With NATO

The cyber security collaboration gives Ukraine access to NATO’s malware information sharing platform, along with 'enhanced cyber cooperation'.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-23

British School Childrens' Confidential Data Dumped

A hacking gang focused on schools & colleges has leaked confidential data about children on the Dark Web after failing to extract any ransom.

2023-01-23

War In Ukraine Drives A Decline In Stolen Cards

Russia's failing invasion of Ukraine led to a 62% decrease in stolen payment card records, attributed to a crackdown on domestic cyber criminals.

2023-01-23

The Back Door Threat To Cybersecurity

Advanced Persistent Threats (APTs) pose a unique challenge with motives, techniques, and tactics that differ from traditional cyberattacks.

2023-01-21

How Next Gen SIEM Addresses The Risks Of Disjointed Security Tools

Multi-vendor Enterprise Software Challenges: With next gen SIEM, unifying disjointed security tools and data sources is more easily achievable.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Seceon

Seceon

Seceon OTM, is a cyber security advanced threat management platform that visualizes, detects, and eliminates threats in real time.

Intrusion

Intrusion

Intrusion provides IT professionals with the most robust tool set available for performing in-depth research and analysis of network traffic.

SparkCognition

SparkCognition

SparkCognition’s AI-powered solutions enhance cybersecurity, identify and prevent equipment failures before they happen, and provide prescriptive intelligence for maintaining your most critical assets

Berwick Partners

Berwick Partners

Berwick Partners’ Cyber Security Practice is a leading recruiter of senior management positions in this field; we have an exceptional understanding of the constantly changing Cyber landscape.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

BAI Security

BAI Security

BAI Security is a Nationally Recognized Leader in IT Security. Keeping your data safe and your business compliant is our singular focus.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.

Invisily

Invisily

Invisily makes enterprise and cloud computing resources invisible to attackers with zero trust solutions, making them visible only when needed to only those who need them.

Netia

Netia

Netia is a Polish telecommunications company providing a range of business services including network solutions, communications, data centre and cloud, and cybersecurity.