News

2022-01-26

Online Daters Must Protect Themselves Against Fraud

Looking For Love: Online Dating has caused heartbreak for many, with over £90 million stolen through fraud and deception last year.

2022-01-26

How To Secure Web Gateway & Web Filtering

A secure web gateway offers protection against online security threats by enforcing company security policies & filtering malicious traffic.

2022-01-25

Ransomware Attack On Moncler

Italian luxury brand Moncler refused to pay ransom when its order processing system was disabled, resulting in a vengeful dump of employee data.

2022-01-25

Defending Against Log4j Vulnerabilities

Concealed Log4j vulnerabilities call for effective measures to reduce the frequency of disruptive events and to reduce the potential damage.

2022-01-25

Auto-Redirects: A Harmful Detour

Auto-redirects are a problem that many web users don't know about and are associated with a loss of privacy, malvertising, malware and more.

2022-01-25

Making Open-Source Software Safer

Open-source software has unique security challenges, because of its widespread use and the fact its security maintenance is reliant on volunteers.

2022-01-24

SAAS Malware Used To Attack Crypto Wallets

Cheap and easy-to-use malware available on Dark Web markets means that it has never been easier for cyber criminals to steal crypto currencies.

2022-01-24

Red Cross Hacked - Half A Million Victims At Risk

Hackers targeted an external server company that stores names, locations & contact information gathered from 60 Red Cross societies worldwide.

2022-01-24

NATO & Ukraine Agree Deeper Cyber Co-operation

The new agreement gives Ukraine access to NATO’s malware information sharing platform and help to identify Ukrainian cyber security training needs.

2022-01-22

The Next 9/11 Will Be A Cyber Attack

As tension in Ukraine grows, some security experts are saying that a cyber attack of devastating proportions is not a matter of if, but when.

2022-01-21

Is Cyber Training Fit For Purpose?

Tick A Box: Just telling your people to use stronger passwords, look out for suspicious links and check emails from new contacts isn’t enough.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Davis Wright Tremaine (DWT)

Davis Wright Tremaine (DWT)

Davis Wright Tremaine is a full-service law firm with offices throughout the US and in Shanghai, China. Practice areas include Technology, Privacy & Security.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

Carbide

Carbide

Carbide (formerly Securicy) breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.

K2 Cyber Security

K2 Cyber Security

K2 Cyber Security delivers the Next Generation Application Workload Protection Platform to secure web applications and container workloads against sophisticated attacks.

BlueRiSC

BlueRiSC

BlueRiSC invent cutting-edge system assurance solutions for the 21st century with novel software and hardware designs focusing on security technologies that can be game changing.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Liberman Networks

Liberman Networks

Liberman Networks is an IT solutions provider company that provides security, management, monitoring, BDR and cloud solutions.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Crispmind

Crispmind

Crispmind creates innovative solutions to some of today’s most challenging technology problems.

Camelot Secure

Camelot Secure

Camelot Secure Secure360 platform is a holistic redefinition of what world-class cybersecurity strategies can be. Prepare. Protect. Deploy.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.