News

2024-04-04

Cambridge University Medical IT System Hacked

Biomedical researchers at Cambridge University have been unable to access computer systems due to suspected "malicious activity".

2024-04-04

Nuclear Waste Dump Faces Prosecution For Cyber Security Offences

IT Security: The British Nuclear Safety regulator will be prosecuting the managing company of the Sellafield nuclear reprocessing plant.

2024-04-12

Amazon Invests $2.75bn In AI Startup

Doubling Down On AI: Amazon will invest a further $2.75bn into Artificial Intelligence startup Anthropic, bringing its total investment to $4bn.

2024-04-05

Why Is Security Reporting Still Failing?

Lost In Translation: Pressure to communicate cyber risk to the board has increased, yet it’s an area that many struggle with. By Phil Robinson

2024-04-12

Helping CISOs Embrace Artificial Intelligence

Centre Of Excellence: Delivering AI-focused cybersecurity consulting services & products to help clients harness the power of AI in the organisation.

2024-04-06

Beware Scammers Imitating Bank Websites

Consumer advice service Which? has found thousands of lookalike websites that imitate British banks, set up to defraud unwary customers.

2024-04-03

The Changing Role Of The CISO 

Strategic Shift: CISOs are increasingly business aware, indicating a significant evolution from traditional roles to strategic business enablers.

2024-03-28

Universities Are Stepping Up Training For More Front-Line Workers

Cyber-Defenders Are In Demand: Pace University is stepping up to train students to identify, defend & mitigate cyber-attacks. By Dr. Jonathan Hill

2024-04-02

Half Of British SMEs Have Lost Vital Data

Almost half (48%) of small and medium-sized businesses in the UK have lost or lost access to company or customer data in the last five years.

2024-04-01

Two Sides Of AI In The Industrial Internet of Things

Dual Perspectives: The synergy of AI and IoT will unlock a new level of creativity & efficiency, redefining industrial operations. By Antoinette Hodes

2024-04-02

What Will The NIS2 Directive Mean For Smaller Organisations?

Raising The Security Bar: NIS2 expands the scope of entities covered and EU states must adopt the legislation by October. By Bernard Montel

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

Stratum Security

Stratum Security

Stratum Security is an information security consulting company that focuses on providing clear and concise risk guidance to its clients through high quality assessment services.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Wiz

Wiz

Wiz - the first cloud visibility solution for enterprise security: A 360° view of security risks across clouds, containers and workloads.

Deft

Deft

Deft (formerly ServerCentral Turing Group) is a trusted provider of colocation, cloud, and disaster recovery services.

Appurity

Appurity

Appurity specialises in mobile and application security, delivering comprehensive solutions across all verticals.

Zokyo

Zokyo

Zokyo is a venture studio that builds, secures, and funds legendary web3/crypto businesses.

Silent Circle

Silent Circle

Silent Circle is the leader in end-to-end enterprise solutions for secure mobile communications.

Entitle

Entitle

Entitle's SaaS-based platform automates how permissions are managed, enabling organizations to eliminate bottlenecks and implement robust cloud least privilege access.