FREE TO VIEW


« Back to News

2024-08-09

British Government Warned To Prioritise Cyber Security

‘Wake Up’: Britain is warned it needs to take further measure to protect vulnerable infrastructure and prevent catastrophic system failures.

2024-08-09

Elon Musk Promotes Fake News About British Rioters

Under Elon Musk's ownership, X / Twitter has had a succession of controversies, including accusations of promoting fake news & hosting harmful content.

2024-08-07

New British Government Cuts £1.3bn Technology Investment Plan

Left In The Lurch: The new Labour government in Britain has cancelled £1.3bn of funding for investment in computer technology and AI projects.

2024-08-06

Four Security Risks Posed by AI Coding Assistants

AI coding assistants offer major benefits by enhancing productivity and automating repetitive tasks. They also pose security & ethical risks.

2024-08-07

Is Your Business Ready For The Inevitable Cyberattack?

Not If, But When: Investment in robust data protection measures is minimal compared to the potential cost of data loss. By Ishwar Fernandes

2024-08-01

Cyber War, Intelligence, Malware & Espionage [extract]

Digital disruption is sweeping through the world’s second-oldest profession, Spying, and it is altering all aspects of intelligence collection.

2024-08-08

Ransomware: A Security Guide [extract]

More than a third of organisations worldwide suffered an attack in 2022, with ransomware attacks occurring approximately every 11 seconds.

2023-02-09

The Latest Artificial Intelligence Technologies [extract]

Through techniques like machine learning and neural networks, companies globally are investing in teaching machines to ‘think’ more like humans.

2023-06-07

Cyber Security Insurance - What You Need To Know [extract]

Cyber Insurance is a smart precaution for any size business, but what does it typically include and how do you make a good policy choice?

2023-09-12

Cyber Revolution - Deep & Dark Web [extract]

The Deep Web is at least 400 to 500 times bigger than the surface Web and there's another murkier side to it, known as the Dark Web.

2022-09-12

Cyber Crime Against Individuals [extract]

It's Personal: Cyber crime continues to rise in scale and complexity, affecting essential services & businesses, as well as many private individuals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

BlueFiles

BlueFiles

BlueFiles enables users to send encrypted files securely while maintaining full control over recipients, access periods, downloads, and printing.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

CyberDegrees.org

CyberDegrees.org

CyberDegrees.org aims to provide top-notch information for students seeking Cyber Security education and career guidance.

Trustelem

Trustelem

Trustelem offers European and global companies a ready-to-use access management service that respects the principles of sovereignty, territoriality and privacy.

101 Blockchains

101 Blockchains

101 Blockchains is a professional and trusted provider of enterprise blockchain research and training.

Basque Digital Innovation Hub (BDIH)

Basque Digital Innovation Hub (BDIH)

The aim of the BDIH initiative is to provide industrial enterprises, especially SMEs, with the technological capabilities needed to meet the challenges of industry 4.0.

Trusted CI

Trusted CI

Trusted CI, the NSF Cybersecurity Center of Excellence is comprised of cybersecurity experts who have spent decades working with science and engineering communities.

LevelOps

LevelOps

LevelOps is an industry application security platform that tracks and develops your application security.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

AirEye

AirEye

AirEye is a leader in Network Airspace Protection (NAP). Block attacks against your corporate network launched from wireless devices in your corporate network airspace.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Radix Technologies

Radix Technologies

Radix offer end-to-end device management solutions, consolidating all the organization devices, processes and stakeholders into one easy-to-use management platform.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Abissi

Abissi

Abissi offer cyber intelligence, IoT security, automotive security, red teaming, application security and artificial intelligence security services, with a focus on security by design.