News

2024-07-31

Electric Vehicle Charging Stations Are Here - Will Cyberattacks Follow?

A Soft Target: Cybercriminals who focus on targeting EV charging stations have the capability to launch attacks right across the local grid.

2024-07-31

DDoS Attack Knocks Azure Offline

Intermittent Downtime: Cyber security teams had to scramble to deal with the widespread incident affecting utilities, banks & government agencies.

2024-08-13

Grok Faces Prosecution For Misusing AI Training Data

Update: Elon Musk's AI model Grok used posts on X as a training tool without properly obtaining users for permission, breaking GDPR rules.

2024-07-30

The AI Threat: How Can Businesses Protect Themselves?

AI offers exponential opportunities for growth, but organisations equally face increasing risks that should not be ignored. By Sam Peters

2024-07-30

What Sets Next-Generation Firewalls Apart From Traditional Firewalls?

In today's complex cybersecurity landscape, organizations need advanced protection to safeguard their networks & data from sophisticated threats.

2024-07-30

The UK Needs To Move Faster On Nuclear Energy Cybersecurity

Britain's nuclear industry has languished. The new Labour government plans to revive it, but cybersecurity needs bolstering. By Dr Marion Messmer

2024-07-30

Overcoming Obstacles To Zero Trust Adoption

Breaking Barriers: The case for adoption is compelling. So, what is holding organisations back from embracing Zero Trust? By Samantha Mabey

2024-07-29

Olympic Sponsors Are Prime Targets For Hackers

Those at risk need to be vigilant against cyber attacks such as ransomware, identity management breaches and physical attacks on hardware.

2024-07-29

Video Game Actors Fear Being Replace By AI 

Actors are worried about gaming producers using GenAI to reproduce their voices and physical appearance without fair compensation.

2024-07-29

Ghost Accounts Spreading Malware On GitHub

Stargazers Ghost Network: A sophisticated DaaS system that distributes malware and malicious links via an estimated 3,000 GitHub ghost accounts. 

2024-07-26

Most Wanted - North Korean Hackers 

$10m Reward: Information leading to the location of Rim Jong Hyok, known to be associated with the Andariel state-sponsored hacking group.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Privacy Professor

Privacy Professor

Privacy Professor provides information privacy, security and compliance services, tools and products to organizations in a wide range of industries.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Bulletproof Cyber

Bulletproof Cyber

Bulletproof offer a range of security services, from penetration testing and vulnerability assessments to 24/7 security monitoring, and consultancy.

limes datentechnik

limes datentechnik

limes datentechnik is an authority in the fields of cryptography and data compression. The FLAM product family is an internationally accepted standard for efficient and safe handling of data.

CyberProof

CyberProof

CyberProof aims to give clarity and confidence to businesses worldwide using a new risk-based approach to cyber security services.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.