FREE TO VIEW


« Back to News

2024-04-18

Penetration Testing Explained [extract]

A Penetration Test (Pen Test) is an authorised simulated attack performed on a computer system to evaluate its security, with authorised permission.

2024-04-22

Important Differences Between Different Types Of Artificial Intelligence [extract]

AI researchers are rapidly developing expert systems for solving a wide range of complex problems, using different techniques & methodology.

2024-06-13

Protecting Data In The Remote Working Era [extract]

Long Term Trend: Regular training & guidance will ensure that remote workers are equipped to do everything they can to keep company data safe.

2024-06-28

Russia’s Nation-State Hackers: A Serious Threat To Global Security [extract]

Russian hacking grabbed attention as a potential threat to free elections, national security, water systems, and even social stability.

2024-06-14

Elections 2024 - Fake News & Misinformation [extract]

Preserving The Integrity Of The Vote: The ready availability of AI text and image generators has greatly increased the threat to democracy.

2022-12-28

Cyber Security Awareness Training For Management & Employees [extract]

What You Can Do Right Now: Businesses are facing unprecedented economic pressures - a cyber attack is the last thing any organization wants.

2024-07-15

A Brief History Of Cyber Crime [extract]

With advances in technology inevitably come heightened risks with cybercrime, which has exploded to become the most active form of crime globally.

2024-08-06

Building Resilience In A Changing Cyber Threat Landscape

Minimising Attacks: Businesses need to arm themselves with AI-enabled defences that are stronger than AI-enabled threats. By Duncan Bradley

2024-08-04

Millions Of US Voters Exposed Online

The exposed databases contained documents with lists of 4.6m available or active voters, absentees, early mail-in voting records & duplicate voters. 

2024-08-05

The Paris Olympics: More Than Just Gold Medals Are At Stake

Liberty, Equality, Security: The Games are a major target for cyber criminals, who see an opportunity to cause major disruption. By Steve Bradford

2024-08-05

Russian Cyberwar Methods Are Evolving

Russia's changing priorities may be an indication that cyber weapons are becoming a more effective alternative to their conventional weapons.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

FAMOC

FAMOC

FAMOC is an enterprise mobile management solution that delivers comprehensive security and management for applications, documents, email, and mobile devices.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Cyber Security Cooperative Research Centre (CSCRC)

Cyber Security Cooperative Research Centre (CSCRC)

The CSCRC provides frank and fearless research and in-depth analysis of cyber security systems, the cyber ecosystem and cyber threats.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

IMQ Group

IMQ Group

IMQ is one of Europe’s top players in the field of conformity assessment. We offer certification services to support all the major sectors of the manufacturing and service industries.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Security Awareness Special Interest Group (SASIG)

Security Awareness Special Interest Group (SASIG)

The Security Awareness Special Interest Group (SASIG) addresses the human aspects of security and fraud prevention in an initiative to improve trust and confidence in the online environment.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.