FREE TO VIEW


« Back to News

2024-03-20

AI As A Standalone Cybersecurity Solution 

Relying solely on AI tools and removing the human element risks facing adversaries that outpace the machine's capabilities. By Chris Stouff

2024-03-07

A Deep Dive Into Deepfakes & The Threat To Digital Identity Verification

Understanding the complexities of deepfake mechanics and their effects will help minimize the risks & boost the security of identity verification.

2024-03-15

The Cyber Skills Gap & How We Act For The Future

Never Too Late: Digital transformation is running far ahead of the available skills to protect data and prevent cyber crime. By Charles White

2024-03-19

Insights From An Early Adopter Of Microsoft 365 Copilot

Navigating The Future: Microsoft 365 Copilot is not just another button to use within Word or Outlook; it’s an entirely new way of working. By Scott Dodds

2024-03-05

Identifying OSS Security Risks To Safeguard Software Supply Chains

Securing Code: Safeguarding the software supply chain is a shared responsibility for developers, administrators & organisations. By Ax Sharma

2024-04-10

British Navy Combines With The Japanese Military To Counter Cyber Attacks

British Royal Navy specialists join forces with Japan's defence forces to deal with cyber attacks during a large-scale cyberwar exercise.

2024-03-26

Humanoid Robot Startup Valued At $2.6 Billion

Major New Investors: Figure AI is a new startup firm which is working to build humanoid robots that can perform dangerous, undesirable jobs.

2024-03-25

Computers With Light-Speed Capabilities

Light-Based Processor: A new type of computer, using light rather than electricity, which could perform calculations faster, using less energy.

2024-03-25

China Is Predicted To Expand Its Cyber Espionage Operations

Broken China: Economic problems and internal dissent may prompt even more aggressive online spying to steal foreign IP & technology secrets.

2024-03-08

$15m Bounty To Identify LockBit Bosses

A huge reward is being offered for information leading to the identification or location of any of the leaders of the LockBit ransomware gang.

2024-04-11

First Generative AI Powered Conversational Search Assistant

Gaia: An AI-powered search assistant using Retrieval Augmented Generation & Large Language Models designed to transform data into knowledge.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

SecPoint

SecPoint

SecPoint provides products to secure & protect your network from remote and local attacks.

Ripjar

Ripjar

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented.

CERT.at

CERT.at

CERT.at is the Austrian national Computer Emergency Response Team.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Centre for Cyber Security (CFCS) - Denmark

Centre for Cyber Security (CFCS) - Denmark

The Centre for Cyber Security is the Danish national IT security authority, Network Security Service and Centre for Excellence within cyber security.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Digital Resolve

Digital Resolve

Digital Resolve delivers solutions that help companies maintain trust and confidence through proven and cost-effective fraud-protection and identity intelligence technology.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.