FREE TO VIEW


« Back to News

2022-12-09

Proactive Security Tips For Your Business After A Security Breach

Has your business fallen victim to a security breach? Consider the benefits of these security tips, tools & technologies to refortify your security.

2022-12-06

Password Manager LastPass Gets Hacked

The leading password management firm, whose software is used by 33 million users, has disclosed it has been breached twice this year.

2022-12-07

What Should CISO’s Look Out For In 2023?

Stand By For Turbulence: Four key emerging trends that were observed this year and are expected to grow throughout 2023. By Jonathan Lee 

2022-12-05

Fake Instagram Message Attacks Breach Email Security

A sophisticated phishing campaign impersonating Instagram to steal credentials successfully bypassed Microsoft 365 and Exchange security.

2022-12-06

Cybersecurity Risk Management In The Real World

The cost of implementing a resilient risk management strategy is measurable. The damage to a breached company's reputation isn't. By Ryan Swann

2022-12-05

The Top 5 Challenges Of Securing Remote Work

Remote Working Is An Expected Privilege: A survey says that 60% of decision makers expect this to increase their risk of a breach. By Jon Fielding

2022-12-03

Trump Turns Down Twitter

Elon Musk says that former US President Donald Trump's account has been reinstated after users narrowly backed the move. Trump says No.

2022-12-05

Ransomware Gang Makes $100 Million

Over 1,300 Organisations Extorted Since 2021: Education and healthcare institutions are among those targeted by the Hive ransomware group.

2022-12-05

Ericsson Invests In 6G Network Research

Merge The Digital & Physical World: Network equipment maker Ericsson will be investing heavily into 6G mobile connectivity research in Britain.

2022-12-01

Defending Against North Korea's Cyber Threats

The US and South Korea are to cooperate on mutual defense measures to combat the cybercrime capabilities of North Korea's state sponsored hackers.

2022-11-30

No Slack In The System

Attack Vector: Internal communication channels are an increasing cybersecurity risk that criminals are using to devastating effect.  By David Nelson

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

Qolcom

Qolcom

Qolcom is a leading UK based integrator of secure wireless network and mobile device management solutions.

Kenna Security

Kenna Security

Kenna Security is a risk intelligence & vulnerability management platform that helps prioritize and remediate vulnerabilities.

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Redbelt Security

Redbelt Security

Redbelt is a cyber security consultancy. We integrate people, systems, services and products to transform how your information security is delivered.

EPIC Insurance Brokers & Consultants

EPIC Insurance Brokers & Consultants

EPIC is an insuarnce broker and consultancy firm. Risk management services include risk consultancy and cybersecurity insurance.

C5 Capital

C5 Capital

C5 Capital is a specialist investment firm that exclusively invests in the secure data ecosystem including cybersecurity, cloud infrastructure, data analytics and space.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Acumera

Acumera

Acumera is a leader in managed network security, visibility and automation services.

AVEVA

AVEVA

AVEVA has a long history in providing Supervisory Control and Data Acquisition software for meeting complex and evolving automation requirements.

Reken

Reken

Reken are building a new type of AI platform and products to protect against generative AI threats.

Tech Data

Tech Data

Tech Data, a TD Synnex company, is a leading global distributor and solutions aggregator for the IT ecosystem.

Intraframe US

Intraframe US

Intraframe US is a cybersecurity company in Memphis, specializing in Digital Forensics Incident Response and Managed IT services. We provide SMBs with a 24/7 SOC for proactive Cyber Threat Management.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.