FREE TO VIEW


« Back to News

2022-07-11

Bluetooth Devices Can Covertly Track Mobile Users

A Significant Privacy Risk: Your smartphone & laptop give off unique Bluetooth radio signals that can be identified and used to track your location. 

2022-07-11

CISA Detects Many New Cyber Security Vulnerabilities

CISA has detected 36 new vulnerabilities in frequent use by cyber criminals as attack vectors posing significant risks to government & business.

2022-07-08

Future Phishing Attacks Will Use Generative Machine Learning

Phishing attacks will get more sophisticated as criminals turn to Machine Learning techniques that can analyse datasets & generate attack vectors.

2022-06-28

Edge AI: The Future of Artificial Intelligence And Edge Computing

Forward-thinking companies and cloud providers see new opportunities in the integration of edge computing and AI. By Helen Wilson

2022-06-27

Ransom: Prepare For The Worst

No sector is safe from ransomware and attacks are getting more sophisticated. How can you protect your business? By Simon Eyre

2022-06-16

Fixing The Cyber Security Workforce Gap

Recruiting entry level & junior staff and investing in their professional development results in more resilient, sustainable cyber security teams.

2022-06-17

Cloud Computing & Security: What Enterprises Should Know

What are the things that enterprises need to know regarding the maintenance of data in the cloud - is it really safe & secure? By Nicholas Parker

2022-06-14

Elon Musk, YouTube & Bitcoin

Crypto Fraud: YouTube is being criticised for failing to tackle a network of cyber criminals streaming fake Elon Musk videos to steal from viewers.

2022-06-20

British Defence Ministry Gets A Quantum Computer

The British government has got its first quantum computer to process complex calculations at high speed, focused on military applications.

2022-06-20

Channel Islands Used To Launch Global Cyber-Attacks

Usually a target for attack, computers in Jersey have been hijacked and used to launch cyber attacks against target organisations worldwide.

2022-06-13

Warning: Chinese Cyber Attacks

US security agencies say Chinese state-sponsored threat actors are actively targeting telecoms across a wide range of network service providers.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Blue Solutions

Blue Solutions

Blue Solutions is a consultancy-led, accredited software distributor who provides IT solutions and support to small and medium enterprises.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Rapid7

Rapid7

Rapid7 unites cloud risk management and threat detection to deliver results that secure your business and ensure you’re always ready for what comes next.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

CloudInsure

CloudInsure

CloudInsure is a Cloud Insurance platform designed to specifically address emerging liabilities within the Cloud environment.

AA Certification (AAC)

AA Certification (AAC)

AAC provide ISO Quality Management System certification services including ISO 27001.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

Fluency Security

Fluency Security

Fluency is the only Security Analytics & Orchestration (SAO) solution that automates correlation, detection, validation and ongoing tracking.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.