News

2024-03-01

Surge in “Hunter-Killer” Malware

Discovered: A threefold increase in the types of destructive malware designed to actively target defensive systems & capable of disabling them.

2024-02-23

Data Breach - Bank of America Warns Clients & Customers

Bank of America is notifying customers of a cyber attack affecting 57,000 of them that their personal information was stolen in a data breach.

2024-02-29

Nation State Hackers Deploy AI

Offensive Cyber Operations: Microsoft says it has detected threats from foreign countries that have been trying to exploit OpenAI's tools.

2024-02-28

US Navy Will Use Data Analytics For Maritime Security

Structured Data Sets: The US Navy is planning to use automation & data analytics to improve cyber defenses for its unclassified networks.

2024-02-22

A Goal Without A Plan Is Just A Wish

Incident Response: If your goal is a robust information security programme then you must have an Incident Response plan. By Chris Denbigh-White

2024-02-21

Managed Security Services In The Age of Advanced Threat Intelligence 

The goal of threat intelligence is to ensure organisations have the right tools to make better, faster & decisions based on timely, actionable data.

2024-02-20

Top Three Types of Data Security Technology

Encryption, Firewalls, Authentication & Access Control: The top three types of technology that strengthen security and protect against cyber threats.

2024-02-21

Lockbit's Website Taken Down By Law Enforcement

Update: Lockbit provided ransomware-as-a-service to a global network of hackers, supplying the tools needed to carry out attacks.

2024-02-20

23andMe Sparks A Rethink About Safeguarding Critical Data

On-Premises Vs Hybrid Cloud Strategies: A key question for many organisations today is that of where and how they host their data. By Mark Grindey

2024-02-19

Businesses Must Prioritise Safeguards Against Common Threats

Failure to implement a comprehensive cyber resilience program leaves businesses exposed to cybercrime & financial loss. By John McLoughlin

2024-02-20

Cyber Warfare & The Future Of AI

AI will be integral in the next phase of cyber warfare, enabling new tools and new versions of classic attacks, according to intelligence experts.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DoSarrest Internet Security Ltd

DoSarrest Internet Security Ltd

DOSarrest is a fully managed security firm specializing in cloud based DDoS protection services to a worldwide client base.

Prewen

Prewen

Prewen provide solutions to protect sensitive data across the organisation.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

ATIA

ATIA

ATIA provides consulting services in the design and implementation of IT system, Information Security, ISO certification, and professional IT training and education.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

Force Majeure

Force Majeure

Force Majeure specializes in cybersecurity, incident response, and digital forensics, with experience spanning more than a decade.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Siege Technologies

Siege Technologies

Siege Technologies is a pioneer of multi-purpose cybersecurity products and services that enable customers to leverage both offensive and defensive technologies.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.