FREE TO VIEW


« Back to News

2021-03-15

GDPR Is Failing By Not Being Enforced

Critics of GDPR say it has failed to protect personal data. Furthermore, the regulation is doing active harm to EU media and social institutions.

2021-03-15

Ethical Hackers Are Getting Rich

Ethical hackers can make $millions when companies pay them for exposing their vulnerabilities and stress- testing their IT systems.

2021-03-15

British Cyber Security Spending Is Rising

British business is aware of the value of maintaining cyber security spending in an increasingly complex threat landscape. But is it enough?

2021-03-13

European Banking Authority Attacked

The European Banking Authority (EBA) has had it’s Microsoft Exchange Servers breached by a suspected Chinese state-backed hacking group.

2021-03-12

Hacker Forums Hacked

Three major Russian cyber crime forums have been mysteriously disrupted, exposing critical data about their criminal users. Who would do that?

2021-03-11

On International Women’s Day Only 10% Of Top Executives Were Female

Cyber security firms do not appoint women to senior executive jobs. Just 10% of board positions and 16% in management are held by women.

2021-03-08

British Schools & Universities Suffer Attacks

Schools in Nottinghamshire and Belfast’s Queen’s University have had to shut down their IT networks after their systems were hit by cyber attacks.

2021-03-11

President Biden’s Cyber Dilemma

President Biden is grappling with two major cyber incidents in his first 50 days in office, underlining the challenge the US faces from foreign actors.

2021-03-10

Cyber Security For The Internet of Medical Things

The Internet of Medical Things (IoMT) has the potential to improve healthcare, but if not properly secured, these devices can pose huge risks.

2021-03-10

Oxford Covid-19 Laboratory Hacked

Espionage targeting vaccine scientists is surging and Oxford University has confirmed reports that its COVID-19 research labs have been hacked.

2021-03-10

Webinar: Build a security posture strategy in the AWS Cloud

Thursday, March 25th - Join this webinar to learn how to build a security posture strategy for the control plane and assets in the AWS Cloud.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

Guardsquare

Guardsquare

GuardSquare is the global reference in mobile application protection. We develop premium software for the protection of mobile applications against reverse engineering and hacking.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Pareteum

Pareteum

Pareteum is a leading Global provider of mobile networking software and services. Our mission is to provide a single solution to the problem of fully enabling and securing the Mobile Cloud.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

GuardRails

GuardRails

GuardRails provides continuous security feedback that empowers developers to find, fix, and prevent vulnerabilities.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Microland

Microland

Microland’s delivery of digital is all about making technology do more and intrude less for global enterprises. Our services include Cloud & Data Center, Networks, Cybersecurity and more.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

Qeros

Qeros

Qeros is a next-generation distributed system enables secure data and transaction processing at the velocity of thought.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

VENZA

VENZA

VENZA is a data protection company that can help organisations mitigate their vulnerabilities and ensure compliance, keeping guests and their data safe from breaches.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.