FREE TO VIEW


« Back to News

2025-01-21

TikTok Reprieved By Trump

President Trump Stops US TikTok Ban: TikTok will "most likely" be handed a 90-day reprieve just a day before the company said it would "go dark". 

2025-01-20

Salt Typhoon - The Chinese Telecom Hack

What's Next?: Their attacks have impressed by the skill, persistence and ability of Salt Typhoon hackers to embed in computer networks.

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2025-01-17

President Biden’s Final Cyber Security Executive Order  

Parting Shot: It Is unclear how much of Joe Biden’s last-minute directive to strengthen US national cyber security will be embraced by Donald Trump.

2025-01-15

British Government Will Ban Payment For Ransom Attacks 

Deterring Cyber Crime: The intention is to make public sector & infrastructure organisations less attractive targets for ransomware gangs.

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-15

The International Race To Lead In Quantum Technology 

Quantum computers will create extraordinary opportunities for those organisations and nations able to develop and take advantage of them.

2025-01-14

Cyber Attack On Slovakia’s Land Registry

Meet The Neighbours: Ukraine is blamed for a crippling ransom attack on a government agency, described as the largest in the history of Slovakia.

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-08

Which Cybersecurity Trends Will Dominate 2025?

Organisations need to brace for a wave of threats driven by advanced technologies and increasingly sophisticated attack vectors. By Paul McLatchie

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Covenco

Covenco

Covenco is a data management and IT infrastructure specialist. Working with customers to transform their IT environments, with data protection and security at the forefront of everything we do.

Quantivate

Quantivate

Quantivate is a provider of web-based Governance, Risk, and Compliance (GRC) software and service solutions.

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality Information Sharing & Analysis Center (RH-ISAC)

Retail & Hospitality ISAC operates as a central hub for sharing sector-specific cyber security information and intelligence.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Vortiv

Vortiv

Vortiv Ltd (formerly known as Transaction Solutions International Ltd) is a technology based company focused on the cybersecurity and the cloud services sector.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.