FREE TO VIEW


« Back to News

2024-02-19

US Cyber Command Begins A Strategic Review

Cybercom 2.0: With larger teams and stronger capabilities, US adversaries can expect to come under greater pressure than ever before.

2024-02-16

Building A Cyber-Savvy Nation In The Face Of A Talent Shortage

Building a culture of security means investing in your workforce. That's not a one-time expense, but an ongoing commitment. By Spencer Starkey

2024-02-16

Cybersecurity In Managed Cloud: Best Practices For Keeping Your Data Safe

Robust cybersecurity involves choosing a secure provider, implementing strong access controls, and regularly monitoring & updating systems.

2024-02-23

Ransomware Attacks Hit Hospitals In Romania

Childrens and Emergency hospitals in Romania were frozen by a ransomware attack & many others forced offline as a precautionary measure.

2024-02-27

Will Generative-AI Take Female Jobs?

Use of AI in the workplace is increasing fast and female workers are concerned that this technology could place them at a higher risk of redundancy.

2024-02-27

The British Military Works With Ethical Hackers

Britain's Ministry of Defence plans a significant expansion of its defensive security initiative with HackerOne, a leader in hacker-powered security.

2024-02-27

Deepfake 'Face Swap' Attacks Trending

Deepfake attacks using misleading “face swap” technology, with the aim to bypass remote identity verification, have increased sevenfold in 2023.

2024-02-23

Humanoid Robotics: The Next Step For Artificial Intelligence

Embodied AI: Robotic technology is evolving at unprecedented speed, to the point where robots are able to learn by watching what humans do.

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

2024-02-20

Malicious Microsoft Cloud Account Takeover Campaign

Cyber Criminals Follow Businesses Into The Cloud: Basic corporate account credentials are a lucrative potential source of money & further exploits.

2024-02-16

British Police, AI & The Fight Against Cyber Crime 

The fraud and cybercrime landscape is going to be profoundly transformed by AI. A top British Police officer answers some key questions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

NCC Group

NCC Group

NCC Group is a global cyber and software resilience business operating across multiple sectors, geographies and technologies.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (ManuSec)

Cyber Security For Critical Manufacturing (Manusec) is a global series of summits focusing on Cyber Security for Critical Manufacturing Sectors.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

United Security Providers

United Security Providers

United Security Providers is a leading specialist in information security, protecting IT infrastructures and applications for companies with high demands on security.

SKKU Security Lab (seclab)

SKKU Security Lab (seclab)

SKKU Security Lab supports research and education in information security engineering. The lab is a part of the College of Software, Sungkyunkwan University.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Avancer Corporation

Avancer Corporation

Avancer Corporation is a multi-system integrator focusing on Identity and Access Management (IAM) Technology. Founded in 2004.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

IONIX

IONIX

IONIX (formerly Cyberpion) is the attack surface management solution that uses Connective Intelligence to shine a spotlight on exploitable risks across your supply chain.

SecureDApp

SecureDApp

SecureDApp is a blockchain security company that specialises in offering comprehensive security solutions to companies operating in the web3 space.