News

2022-04-13

Cyber Criminals Volunteer For War In Ukraine

Hacking Groups Hit Critical Infrastructure: Anonymous in one corner and Conti in the other as cyber criminals take sides in the Ukraine conflict.

2022-04-12

Impress Your Cyber Insurance Underwriters With These Essential Tips

Cyber insurance is becoming harder to obtain. One solution is to make sure that key corporate assets are only accessible to authorised users.

2022-04-12

Finland Hit By Cyber Attacks

The Finnish Foreign and Defence ministries' websites were knocked offline & the Ministry of Defence tweeted that its website was under attack.

2022-04-11

Bank of Ireland Fined €463,000 Over Data Breaches

A series of data breaches made by the bank affected more than 50,000 customers, who were then not properly informed, as required by law.

2022-04-09

Cyber Security: GCHQ's Director Speaks Out

Britain's spy chief explains how events in Ukraine, the advance of China and COVID convinced him that national cyber security must get better.

2022-04-11

Google’s Emergency Update For Chrome

Chrome users are recommended to upgrade their browsers as soon as possible to prevent attackers exploiting a high-severity zero-day vulnerability.

2022-04-11

Russia Hacked Ukrainian Satellite Communications

The Viasat KA band satellite was hit by a sophisticated cyber attack that wiped devices on the same day that Russia's invasion of Ukraine began.

2022-04-11

Mobile Cyber Attacks: The Different Facets Of Smartphone Malware

Vulnerable Banking Apps: Behavioural biometrics is the key to overcoming the challenge of advances in mobile malware. By Gemma Staite 

2022-04-07

FOR PEN TESTING – CYRIN’s CYBER RANGE

Virtual Simulation: With CYRIN’s Cyber Range, Pen Testers have a new & exciting option to create virtual copies of a client’s network. Book A Demo

2022-04-06

Overcoming The Obstacles Caused By The Great Resignation

One in ten security professionals are looking to move elsewhere to benefit from better pay, conditions and work-life balance. By Fabien Rech

2022-04-06

The Metaverse Will Have An Impact On Privacy & Security

As augmented reality platforms develop into the Metaverse, users are going to be presented with entirely new categories of security risk.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

QinetiQ

QinetiQ

QinetiQ is one of the world's leading defence technology and security companies. Areas of activity include air, land, sea and space systems, weapons, robotics, C4ISR and cyber security.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Waratek

Waratek

Waratek is a pioneer in the next generation of application security solutions known as Runtime Application Self-Protection or RASP.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Utility Cyber Security Forum

Utility Cyber Security Forum

The Utility Cyber Security Forum offers a focused venue in which utility executives can network one-on-one with colleagues facing issues in protecting against cyber attacks.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Binare

Binare

Binare empowers companies all over the world to improve their IIot/IoT /Embedded cybersecurity posture and digital privacy.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.