FREE TO VIEW


« Back to News

2022-02-21

Apple Updates AirTag To Combat Stalkers

Apple will update the iPhone and AirTag software with a warning message that using AirTags to track people is a crime in many jurisdictions.

2022-02-21

Rewired: An AI That Can Learn Like A Human Brain

A brain-inspired computer chip that is capable of rewiring itself as it learns, could transform development of human-level Artificial Intelligence. 

2022-02-17

California College Ransomware Attack

Personal data of faculty & students at a California community college has been exposed and IT systems crippled in a “sophisticated” attack.

2022-02-19

Vodafone Portugal Has Been Hacked

A “deliberate and malicious” cyber attack targeting Vodafone Portugal succeeded in knocking mobile networks offline across the country.

2022-02-16

Military Operating Systems Bring AI To The Battlefield

USA vs China: There is an arms race in Artificial Intelligence with the aim to gain decision-making dominance on the battlefield of the future.

2022-02-15

British Foreign Office Hacked

Britain's Foreign, Commonwealth and Development Office needed 'urgent support' when unidentified hackers got inside their network systems.

2022-02-15

Ransomware Attacks On Transport & Logistics Centres

Planes, Ships & Automobiles: In separate incidents, several European transport & logistics hubs have suffered similar ransomware attacks.

2022-02-14

An Invasion Of Ukraine Might Coincide With Cyber Attacks On Western Banks

Russia could conduct sophisticated cyber attacks on the international banking sector if it doesn't get concessions over NATO's ties with Ukraine.

2022-02-14

Most SMEs Do Not Provide Cyber Security Training

A study reveals that 62% of SMEs have experienced a cyber attack, yet 48% admit their employees have not had recent cyber security training.

2022-02-11

Online Fraud Is A British Security Nightmare

Crime Epidemic: Britain has become a target destination for global fraudsters, to a level where it can be considered a threat to national security.

2022-02-11

A Quick Guide To Remote Code Execution (RCE)

When someone takes remote control of your computer there is a real risk that malware is being installed without your knowledge. By Madeline Miller

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Silicom Denmark

Silicom Denmark

Silicom Denmark is a premier developer and supplier of FPGA-based interface cards for cyber-security, telecommss, financial trading and other sectors.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

InPhySec

InPhySec

InPhySec is a leading New Zealand information, physical and cyber security company.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

Pluribus One

Pluribus One

Pluribus One develops customized solutions and other data-driven applications to secure your business and your devices.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Global Resilience Federation (GRF)

Global Resilience Federation (GRF)

GRF builds, develops and connects security information sharing communities for mutual defense.

Conceal

Conceal

Conceal’s mission is to stop ransomware and credential theft for companies of all sizes by developing innovative solutions that provide social engineering protection in any browser.

Nexer

Nexer

Nexer is a modern tech company with expertise in strategy, technology and communication with a strong vision.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Anetac

Anetac

Developed by seasoned cybersecurity experts, the Anetac Identity and Security Platform protects threat surface exploited via service accounts.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.