News

2024-11-14

Five Best Practices For Secure & Scalable Cloud Migration

Lift & Shift: Follow these five battle-tested best practices to ensure your cloud migration transforms capabilities, not create headaches. 

2024-11-13

Bank Blocks Staff From Using WhatsApp & Facebook Messenger

NatWest Bank has taken action to enforce rules over employees' use of unauthorised messaging services, in a move to avoid heavy fines.

2024-11-13

Network Pen Testing Is A Cybersecurity Secret Weapon

Here’s How To Use It: Six reasons why pen testing should be a regular part of an organization’s security strategy. By Alton Johnson

2024-11-12

Fancy Bear At Work

Confirm You Are Not A Robot: A phishing campaign using emails that deliver a link which appears to be a Google reCAPTCHA bot-detection dialog.

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-12

Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity

Its increasing use for sophisticated phishing emails and deep fake attacks makes AI security more important than ever. By Srikrishna Shankavaram

2024-11-11

The Human Impact Of Ransomware In Healthcare

Urgent action is needed to combat the cybersecurity trade-off which is putting patient’s health and wellbeing at risk. By Darren Williams

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-11-11

Ai-Da - The Robot Artist

Portrait Of Alan Turing: A painting by an AI robot of the eminent World War Two codebreaker mathematician has been sold for over $1m.

2024-11-11

Hackers Target Sensitive Corporate Data 

40GB Of Data Stolen: The French multinational energy & automation company Schneider Electric has suffered a severe attack.

2024-11-08

Testing APIs Against The OWASP LLM Top 10

Insufficiant Testing: Several popular GenAI applications have been found to be exposed to indirect prompt injection vulnerabilities. By Andy Mills

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

Vaadata

Vaadata

Vaadata are experts in ethical hacking. We secure your web, mobile and IoT platforms.

Bessemer Venture Partners (BVP)

Bessemer Venture Partners (BVP)

Bessemer Venture Partners was born from innovations that literally forged modern building and manufacturing. Today, our team of investors works with people who want to create revolutions of their own.

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky Industrial CyberSecurity (KICS)

Kaspersky addresses all the cybersecurity needs of industrial organizations in its Kaspersky Industrial CyberSecurity (KICS) portfolio.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

cleverDome

cleverDome

cleverDome has created the first community built and proven model that redefines the standards for protecting the most confidential data and information of consumers in the cloud.

Amvia

Amvia

Amvia is a fast-growing telecoms, Internet and Microsoft service provider. We supply voice, data and cyber security services to 100s of small and large companies.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Atlas Cloud

Atlas Cloud

Atlas Cloud is a UK-wide provider of managed services based in Newcastle. Our ‘research-led’ approach to IT services helps leaders make better decisions about IT for their businesses.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Cyberhill Partners

Cyberhill Partners

Cyberhill is a professional engineering services firm solving complex software implementation and integration challenges.