FREE TO VIEW


« Back to News

2024-08-05

App Security Testing: Exploring The Pros & Cons Of Different Approaches 

Understanding Emerging Technology Risks: It is important to be familiar with the different approaches in app security to choose the right solutions.

2024-08-02

Dark Angels Score Record Breaking $75m Ransom

Extortion Pays: ThreatLabz has uncovered a victim who paid Dark Angels $75 million in ransom, higher than any previous publicly known amount.

2024-08-02

Hackers Target Maritime Facilities With Malware

Sidewinder: An Indian APT using spear-phishing to deliver malicious payloads to conduct espionage and trigger new chains of attack.

2024-08-01

AI At The Paris 2024 Olympics

The 2024 Games are using AI tools across many applications. But the large amounts of data being generated risk being used for malicious purposes.

2024-07-31

Electric Vehicle Charging Stations Are Here - Will Cyberattacks Follow?

A Soft Target: Cybercriminals who focus on targeting EV charging stations have the capability to launch attacks right across the local grid.

2024-07-31

DDoS Attack Knocks Azure Offline

Intermittent Downtime: Cyber security teams had to scramble to deal with the widespread incident affecting utilities, banks & government agencies.

2024-08-13

Grok Faces Prosecution For Misusing AI Training Data

Update: Elon Musk's AI model Grok used posts on X as a training tool without properly obtaining users for permission, breaking GDPR rules.

2024-07-30

The AI Threat: How Can Businesses Protect Themselves?

AI offers exponential opportunities for growth, but organisations equally face increasing risks that should not be ignored. By Sam Peters

2024-07-30

What Sets Next-Generation Firewalls Apart From Traditional Firewalls?

In today's complex cybersecurity landscape, organizations need advanced protection to safeguard their networks & data from sophisticated threats.

2024-07-30

The UK Needs To Move Faster On Nuclear Energy Cybersecurity

Britain's nuclear industry has languished. The new Labour government plans to revive it, but cybersecurity needs bolstering. By Dr Marion Messmer

2024-07-30

Overcoming Obstacles To Zero Trust Adoption

Breaking Barriers: The case for adoption is compelling. So, what is holding organisations back from embracing Zero Trust? By Samantha Mabey

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Belkasoft

Belkasoft

Belkasoft is a software vendor providing public agencies, corporate security teams, and private investigators with digital forensic solutions.

Verifi

Verifi

Verifi is an award-winning provider of end-to-end payment protection and risk management solutions.

SkillCube

SkillCube

SkillCube is one of the pioneers in India focusing on Cyber Security Skill Development Solutions.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

CybX Security LLC

CybX Security LLC

CybX is the first company of its kind to merge the practice of computer forensics with computer security and information security.

OWN

OWN

OWN (formerly SEKOIA) is a major French player in cybersecurity providing tailor-made, informed and adapted cyber support thanks to its DNA of passionate and committed experts.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.