FREE TO VIEW


« Back to News

2024-08-15

Business Identity Theft: Saving The Digital World From Fake Businesses

Protect Your Business From Identity Theft: Discover how to identify fake businesses and safeguard your digital presence today. By Sophie Martin

2024-08-16

Trump Campaign Emails Hacked

Update: Donald Trump’s election campaign claim that its internal communications have been hacked by the Iranian government looks credible.

2024-08-16

EU Regulators Threaten To Prosecute Elon Musk

Illegal Content: The European Union is heading for a confrontation with Elon Musk following his live interview with Donald Trump on X.

2024-08-14

Coming Soon - An AI Cyber Security Code

AI Cyber Security Code Of Practice: A proposed set of guidelines that could become the standard for AI security in Britain & potentially worldwide.

2024-08-13

Venezuela Blocks Access To X

VPN Surge: Venezuela’s government has restricted access to a range of online services in response to civil unrest over disputed election results.

2024-08-13

Hackers Stealing Data Using Cisco Smart Install

CISA Warning: Hackers are exploiting an obsolete Cisco Smart Install feature to get access to sensitive data using readily available protocols.

2024-08-20

Ransomware Attack Trends & The True Costs To Victims [extract]

Ransomware attacks pose significant risks to businesses worldwide, with cyber criminals employing increasingly sophisticated tactics to extort payments.

2024-08-07

The Role of VPNs In The World Of Cybersecurity

Safeguarding Sensitive Information: VPNs offer a layer of protection which helps users to navigate the Internet with greater security and anonymity.

2024-08-12

British Nuclear Plant Has Serious Cyber Security Failures

Multiple investigations revealed staggering vulnerabilities that exposed the operation to a wide range of potentially devastating cyber attacks.

2024-08-12

Microsegmentation In 2024: Trends, Technologies & Best Practices

Enhanced Security: By segmenting the network, security policies can be enforced at more precise levels, making it harder for threats to propagate.

2024-08-09

GenAI & Cybersecurity: The New Frontier Of Digital Risk

Understanding the risks of adopting GenAI is crucial for businesses seeking to harness its power while safeguarding their assets. By Pravesh Kara

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IoT Security Foundation (IoTSF)

IoT Security Foundation (IoTSF)

IoTSF is a collaborative, non-profit organisation with a mission to raise the quality and drive pervasive security in the Internet of Things.

App-Ray

App-Ray

App-Ray provides fully automated security analysis of mobile applications to find security issues, privacy breaches and data leaking potentials.

Coro Cybersecurity

Coro Cybersecurity

Coro (formerly Coronet) empowers organizations to protect against malware, ransomware, phishing, and botnets - across devices, users, and cloud applications.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Incognito Forensic Foundation Lab (IFF Lab)

Incognito Forensic Foundation Lab (IFF Lab)

IFF Lab is a premier cyber and digital forensics lab in India that offers forensic services and solutions, cyber security analysis and assessment, IT support, training and consultation.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

EBRAND Services

EBRAND Services

EBRAND, the European experts for brand protection on the Internet. We offer a full set of services including cybermonitoring, fighting counterfeiting offences and online security.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.