FREE TO VIEW


« Back to News

2023-10-04

China Accuses The US Of Spying On Huawei

Huawei Compromised & Data Stolen: The escalating conflict between the US and China over technology and security issues reaches a new level.

2023-10-04

British Online Safety Bill Will Restrict Social Media

Parliament has passed a controversial new law aimed at making social media firms more responsible for users' safety on their platforms.

2023-10-08

AI-Powered Cyber Security Software For SMEs & Consumers

Acronis claim that its new AI-based security product is the ultimate must-have solution for individuals, families, and small businesses.

2023-10-06

Cyber Criminals Exploit Legitimate Software

Remcos & GuLoader: Research has found malicious trojans packaged with legitimate software widley available from criminally complicit vendors.

2023-10-02

The Battlefield Transformed

Armed Conflict Is Changing: Disruption of critical infrastructure is the first strike in cyber warfare, with the aim of creating chaos.

2023-09-27

Neuromorphic Computing Changes Machine Learning

Hardware & Software Elements: A method of computer engineering in which aspects of a computer are modeled like the human brain & nervous systems.

2023-09-25

Cyber War Crimes Will Be Prosecuted

The International Criminal Court is set to investigate and prosecute cyber war crimes in the way it investigates kinetic and physical war crimes.  

2023-09-26

Update: The 2023 Malware League Table

The Education & Research sector is ranked as the most affected industry globally, with Communications overtaking Healthcare for the first time.

2023-09-26

US National Cyber Security Strategy Moves On

The White House already has a new national cyber strategy. So does CISA and the Pentagon. Now, the US State Department wants one too.

2023-09-26

Quadruple Extortion  Ransomware

Phases Of The Extortion Cycle: Criminals are getting more focused, specialized & effective in maximizing the ransom they extract from their victims.

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Zighra

Zighra

Zighra is a leading provider of On-Device AI solutions for continuous authentication and fraud detection on mobile and web applications.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

LGMS - LE Global Services

LGMS - LE Global Services

LGMS is a leading cyber security penetration testing and assessment firm in the Asia Pacific region.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

Slamm Technologies

Slamm Technologies

Slamm Technologies is a trusted IT firm that offers Cyber Security Support, Corporate IT Solutions and Professional IT Training courses with international certification.

RiskSmart

RiskSmart

RiskSmart empower risk, compliance, and legal teams with a tech-led and data-driven platform designed to save time, reduce costs and add real value to businesses.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.

Verosint

Verosint

Verosint (formerly 443ID) provides real-time account fraud prevention that reveals fraudsters hiding in user accounts and proactively blocks them before their attacks can cause harm.