FREE TO VIEW


« Back to News

2023-01-09

Web Browser Attacks & How To Combat Them

The web browser has become the biggest attack surface available to threat actors, who are actively leveraging and exploiting it. By Jonathan Lee

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2023-01-06

PAM, IAM, Or Both?

Useful But Different: Identity & Access Management (IAM) and Privileged Access Management (PAM) are not the same thing. By Colin Tankard

2023-01-06

EU Fines Meta $416m

Targeted Advertising: Ireland's Data Commissioner rules that Meta used peoples' data for adverts on Facebook and Instagram unlawfully.

2023-01-04

Multi-Factor Authentication Is No Shortcut To Cyber Resilience

Persistence Pays Off For Hackers: There's more to cyber resilience than MFA and broader technological & cultural changes are needed. By Adrian Odds

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

2023-01-03

Biden Signs Quantum Cyber Security Act

Q Day: The law is designed to secure US government systems & data against the fast approaching threat of quantum-enabled data breaches.

2023-01-03

2023 Tech Predictions

This year will see IT teams using new tools & strategies to counteract the expanding threat landscape. Here are a few predictions. By James Karimi

2023-01-03

Meta Pays $725M To Settle Facebook Privacy Suit

Facebook’s parent company Meta has agreed to settle a US lawsuit following 2018 revelations that Facebook illegally shared data of 87m users.

2022-12-31

Looking Back - Top 10 Most Read Articles Of 2022

2023 Loading: A review of the most popular stories on this website in 2022 reveals two main trends - Cyber Resilience and Cyberwar in Ukraine.

2022-12-31

From AI to ESG: Key Security Technology Trends Of 2023

Upheaval Or Realignment? The six key technology trends that are set to impact the security sector in the coming year. By Johan Paulsson

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Sumo Logic

Sumo Logic

Sumo Logic simplifies how you collect and analyze machine data so that you can gain deep visibility across your full application and infrastructure stack.

ZenMate

ZenMate

ZenMate is a Virtual Private Network services provider offering secure encrypted access to the internet.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

TM One

TM One

TM One is the enterprise and public sector business solutions arm of Telekom Malaysia Berhad (TM) Group.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

StartupXseed Ventures

StartupXseed Ventures

StartupXseed Ventures is a smart capital provider for Deep Tech, B2B, Early Stage Startups. We support, NextGen Tech Entrepreneurs, who have potential to deliver the outsized growth.

Pyxsoft PowerWAF

Pyxsoft PowerWAF

Pyxsoft PowerWAF responds to the problem of business cybersecurity. We protect our clients' websites and data against attacks and exploitation of all kinds of vulnerabilities.

UST

UST

UST is a global provider of digital technology and transformation, IT services and solutions including managed security services.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Hummingbird International

Hummingbird International

Hummingbird International, LLC offers services for the collection, audit, computer recycling and safe disposal of laptops, monitor/LCD, hard drives, and IT disposal.