FREE TO VIEW


« Back to News

2025-02-03

Hackers Steal Data From Leading Indian Bank

Baseless & Mischievous: The Bashe ransom group claims it breached the customer database of the ICIC private bank. Not for the first time.

2025-02-03

Defending The Gig Economy Against API Attacks

GenAI is likely to be a big enabler for the gig economy. It also has the power to be hugely destructive when used maliciously. By James Sherlow

2025-02-01

Multiple Cyber Security Problems For Manufacturers 

Manufacturers are prioritizing improved cyber security, but failing to tackle network infrastructure issues can restrict progress. By Renuka Nadkarni

2025-01-31

Securing Critical Infrastructure From Nation-State Threats  

Q&A: Why more must be done to protect the vulnerable operational technology underpinning essential areas like energy, water & transport.  

2025-02-04

The British Government Faces Severe Cyber Threats

The cyber threat to UK government is severe and advancing quickly - the government must act now to protect its own operations and key public services.

2025-01-31

PayPal Pays A Price For Exposing Customer Data

PayPal left names, dates of birth and Social Security numbers belonging to its customers readily accessible to cyber criminals for several weeks.

2025-02-01

How Does DeepSeek Compare With Other Chatbot AI Tools?

Don't Talk About Tiananmen: Easy to use and mostly accurate, DeepSeek censors itself when answering questions about subjects banned in China.

2025-02-03

US Nationals Indicted For Fraudulent Remote IT Work

The FBI has uncovered a plot to install North Korean IT workers as remote employees to generate revenue for North Korea and evade sanctions.

2025-02-03

EU Sanctions Russians For Attacks On Estonia

Unit 29155 of Russia's military intelligence has been identified as responsible for a campaign of network intrusion & and data theft against Estonia.

2025-02-03

CISOs Increase Crisis Simulation Budgets

CISOs have growing concerns around rising attack volumes, lack of incident response planning and inadequate stress-testing of crisis scenarios.

2025-01-30

Ransomware Readiness: Transforming Threat Into Organizational Resilience

Boards that fail to prepare risk exposing their organisations to avoidable crises and losing the trust of their stakeholders. By James Eason

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cloud Credential Council (CCC)

Cloud Credential Council (CCC)

The CCC is a leading provider of vendor-neutral certification programs that empower IT and business professionals in their digital transformation journey.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

NetCentrics

NetCentrics

NetCentrics leverages an innovative, agile, ‘what’s-next’ approach to our customers’ IT and cyber challenges.

Cyber Ranges

Cyber Ranges

Cyber Ranges is the next-generation cyber range for the development of cyber capabilities and the validation of cyber security skills and organizational cyber resilience.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Security Discovery

Security Discovery

Stay ahead of cyber threats with Security Discovery. We offer expert consulting, comprehensive services, and a powerful vulnerability monitoring SaaS platform.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).