FREE TO VIEW


« Back to News

2021-05-28

Managing A Remote Team To Protect Against Cyber Attacks

Many more organisations are adopting remote working, but how can they manage a remote team while prioritizing cybersecurity? By Chioma Iwunze

2021-05-29

The Underlying Ethics Of Data Scraping & Mining

Data scraping is an inevitable part of the way the internet works but those interested in collecting data this way should abide by ethical rules.

2021-05-24

Apple Stores Customer Data In China

Apple stores its Chinese customer data in China, raising concern that this user data is readily accessible to the Chinese government on demand.

2021-05-23

Will Governments Ban Ransom Payments To Hackers?

Britain's ex-NCSC chief is just one expert who is urging governments to ban ransomware payments to prevemt criminals profiteering from their attacks.

2021-05-23

New Zealand Health Service Is Under Attack

Full Outage: The crippling attack on Ireland's healthcare system has some characeristcs that suggest it is being repeated in New Zealand.

2021-05-21

Dutch Cyber Security Under Threat

With its infrastructure largely run by foreign technology businesses, there is growing concern in the Netherlands over national digital autonomy.

2021-05-19

Most Cyber Security Teams Are Understaffed

Survey: While the cyber security workforce has been largely unscathed by the Coronavirus pandemic, the long term skills shortage persists.

2021-05-19

Russian Hackers Have Updated Their Techniques

Russia's hackers are technologically sophisticated & highly capable, with well-developed abilities to target almost any organisation around the world.

2021-05-18

Ireland’s Health Service Won't Pay Ransom

Ireland's Health Service has ruled-out giving in to hackers' ransom demands as healthcare systems struggle to deal with a significant cyber attack.

2021-05-18

Bitcoin Is Bad For The Environment

As the world desperately needs to cut carbon emissions, it doesn’t make sense to devote enormous energy resources to a virtual currency.

2021-05-18

The Role Of Enterprise Architecture In Cyber Defence

Learning the lessons from the unprecedented SolarWinds attack and the role that Enterprise Architecture has to play. By Rupert Colbourne

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

Culinda

Culinda

Culinda secures medical IoT devices in hospitals with An Artificial Intelligence platform and security gateway.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

HTX (Home Team Science & Technology Agency)

HTX (Home Team Science & Technology Agency)

HTX brings together science and engineering capabilities to transform the homeland security landscape and keep Singapore safe.

MergeBase

MergeBase

Reduce software supply chain risk with MergeBase proven Software Composition Analysis (SCA).

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.