FREE TO VIEW


« Back to News

2023-04-04

AI Revolution: The Future Is Here, Now

Artificial intelligence will change our lives, in ways both good and bad. But how confident can we be that we are prepared for what's coming?

2023-04-04

Universities Are Exposing Their Students To Cyber Threats

Universities are lagging on basic cyber security measures, subjecting both students & staff to higher risks of credentials-based email fraud.

2023-04-01

Honeypot Sting Exposes British Cyber Criminals

Operation 'Power Off': Police clamp down on cyber criminals using Distributed Denial of Service tactics to target online businesses & their users.

2023-04-05

New Webinar: Next-generation Firewalls

Learn how a next-generation firewall is key to protecting organizations from evolving challenges. Register Now

2023-03-31

Imminent: Cybersecurity Regulations For US Financial Services

Don't Wait: Firms should test their vulnerability management programs, introduce a patch program and do penetration testing now. By Simon Eyre

2023-03-30

The Cybersecurity Threat To Railways

Ransomware attacks are an increasingly significant cyber threat facing the transport sector in the EU and railways are the prime target.

2023-03-31

The Inevitable Rise Of Artificial Intelligence

Technology leaders are calling for a six-month halt to training new AI systems to give the industry time to assess the risks. By Winlo & Cambolin

2023-03-31

Understanding The Incident Response Lifecycle

Best practices help organizations enhance their incident response capabilities, ensuring a more effective response to cybersecurity incidents.

2023-03-30

The Most Important Technology Advance In Decades

Bill Gates says Artificial Intelligence is as fundamental as the creation of the microprocessor, the PC, the Internet and the mobile phone.

2023-03-30

Bitbucket Backup Methods

What if you lose access to your crucial Bitbucket data? It can lead to business disruption, and more or less significant data loss.

2023-03-29

Cyber Security Budgets Are Misspent

Over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Computest

Computest

Computest security testing services include Mobile app security, Vulnerability assessments, Attack & penetration testing, Security awareness training, Network security assessments.

Seculert

Seculert

The Seculert Attack Detection & Analytics Platform combines machine-learning based analytics and threat intelligence to automatically detect cyber attacks inside the network.

Zeguro

Zeguro

Zeguro provides complete cybersecurity risk assessment, mitigation and insurance, allowing you to easily manage your cyber risk.

Axur

Axur

Discover and eliminate digital fraud and risks on the web. Utilize Axur’s entire AI potential, along with thousands of bots dispersed throughout the surface web as well as the deep and dark web.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

JaCIRT

JaCIRT

JaCIRT is the national Cyber Incident Response Team for Jamaica, established to deliver on the mandate outlined in the GoJ’s National Cyber Security Strategy.

Advantage

Advantage

Advantage exists to provide peace of mind in an evolving technology reliant world. We were created by visionaries who for nearly 4-decades have been passionate about providing world-class solutions.

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators (IAFCI)

International Association of Financial Crimes Investigators provides services and information about financial fraud, fraud investigation and fraud prevention.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Dedagroup (Deda)

Dedagroup (Deda)

Dedagroup provide application solutions and IT services to bring innovation at the core of business processes.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.