News

2024-06-18

Chinese Hackers Have A Global Impact

Chinese state-sponsored hackers gained access to 20,000 Fortinet FortiGate systems worldwide by exploiting a known critical security flaw.

2024-06-18

Taming Aggressive Algorithms

Child Protection: The British regulator has new rules to protect children online, part of a draft Children's Safety Codes of Practice. By David Varney

2024-06-17

Instagram & Facebook Are Addictive For Children

Negative Effects: The EU is investigating Meta's Facebook and Instagram social media platforms over concerns for children's mental health.

2024-06-14

The Internet Is Good For You

Internet Access Improves Personal Well-Being: People with Internet access or actively using the Internet report greater levels of life satisfaction.

2024-06-13

EC-Council To Decrease AI Chasm With Free Cyber AI Toolkit

EC-Council's Pro-Bono Cyber AI Toolkit: Setting New Standards for Cybersecurity Training in the US for its Certified Members.

2024-06-14

Too Many Tools - Cybersecurity Professionals Feel Out Of Control 

An average cybersecurity stack comprises 32 solutions, highlighting the need for consolidated platforms to deal with growing complexity.

2024-06-13

AI-Generated Misinformation - A Growing Concern For 2024 Elections

Cybersecurity & Trust: Concerns around the use of AI-generated content are coming to prominence ahead of the British parliamentary election.

2024-06-13

Protecting Data In The Remote Working Era

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-12

Cyber Criminals Do Not Care Who Falls Victim

Attacks on Santander and NHS London demonstrate why cyber insurance should be part of every business' resilience strategy. By Marc Rocker

2024-06-10

Britain's Cybersecurity Business Is Booming

British Cyber Security Sectoral Analysis: The successful growth of the domestic cybersecurity industry is having a nationwide impact.

2024-06-12

Kinsing Malware Attacks Analysed

A Critical Threat: Kinsing targets cloud infrastructure, exploiting misconfigurations to rapidly spread attacks across numerous popular applications.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Emerson Electric Co

Emerson Electric Co

Emerson provides industrial automation systems and associated cybersecurity solutions to protect critical process control systems from cyber attack.

RedShield Security

RedShield Security

RedShield is the world's first web application shielding-with-a-service company.

OutThink

OutThink

OutThink is a web-based platform (SaaS) that has been developed specifically to identify and reduce risky workforce behaviours and build a risk aware culture.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

CyberForum

CyberForum

CyberForum supports businesses from the IT and high-tech industry in all stages of their development: from startup consulting to professional staffing and even location marketing campaigns.

Curricula

Curricula

Curricula's cyber security awareness training delivers short relatable security stories to your employees. We make learning cyber security simple and fun.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Robo Shadow

Robo Shadow

Robo Shadow are trying to bridge the gap between the top tier organisations that can afford everything and everyone else who has to “Make it up as they go along” when it comes to Cyber.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

Snare

Snare

Snare is a comprehensive set of event monitoring and analysis tools designed to address critical auditing and security requirements.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.