News

2024-07-16

Google Will Pay $23B To Acquire Cyber Security Firm Wiz

Google's parent company Alphabet is in advanced talks with the aim of acquiring the cyber security firm Wiz, for an astonishing price $23 billion. 

2024-07-16

Data Belonging To 110m AT&T Customers Stolen

Undetected For Two Years: AT&T has confirmed that the records of calls and texts of 110 million wireless customers have been stolen.

2024-07-12

Ransomware Attack Hits Global Card Processing Company

TPS Worldwide, a Pakistani card processing company that provides services to numerous financial institutions, is facing a massive ransom attack.

2024-07-12

Warning - APT40 Espionage Group At Work

Genuine & Increasing Risk: Western government security agencies issue a joint advisory about the Chinese cyber spies known as APT40.

2024-07-12

Human Error - The Weakest Point In Cyber Security 

In a survey, 74% of CISOs report human error to be perceived as the weakest point and the most significant vulnerability in cybersecurity.

2024-07-12

The Growing Menace Of Ransomware

Understanding & Combating The Threat: By adopting proactive, multi-layered defences, businesses can reduce their vulnerability. By Pravesh Kara

2024-09-02

Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-07-10

Navigating The Complexities Of Data Backups In A Hybrid World

Going Hybrid: Many businesses mistakenly believe that cloud providers handle all backup needs, but this is usually not the case. By Brent Torre

2024-07-09

Breach Exposes Millions Of Mobile Numbers To Phishing Attacks

30m Users Exposed: Unidentified threat actors have exploited an unauthenticated endpoint in Authy’s MFA platform.

2024-07-11

Half Of Employees Don’t Report Security Mistakes

Despite increased security awareness training, more than half of cyber security professionals share concerns over security behaviours.

2024-07-09

Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware

Velvet Ant: A command injection exploit that allows an authenticated, local attacker to execute arbitrary commands without syslog alert messages.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Sonatype

Sonatype

Sonatype protects the world's enterprise software from security, compliance, licensing risks, while reducing application development and deployment time.

CERT.GOV.AZ

CERT.GOV.AZ

Azerbaijan Government Computer Incident Response Team

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Salviol Global Analytics

Salviol Global Analytics

Salviol Global Analytics is a leading provider of Fraud, Risk and Operational Performance Solutions to a number of vertical markets including Insurance, Banking, Utilities, Telco’s and Government.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

NuCrypt

NuCrypt

NuCrypt is developing technology that is applicable to ultrahigh security data encryption as well as key distribution.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

Synagex

Synagex

Synagex Modern IT is a simple IT and cybersecurity solution for businesses.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.