FREE TO VIEW


« Back to News

2023-08-21

US Military Offers A Reward To Satellite Hackers

Since 2020, the US military has been staging a satellite hacking contest at the DEFCON convention. This time, they can get to do it for real.

2023-08-19

Police Error Exposes Personal Data Of Crime Victims

British police forces mistakenly released the data of 1,230 people, wrongly included in the files responding to freedom of information requests.

2023-08-19

How SMEs Can Achieve Cyber Resilience

For big businesses the consequence of a cyber attack can be very costly. For smaller organisations, they can be devastating. By Tom Egglestone

2023-08-16

The UN Cybercrime Convention Could Help & Harm Victims

The proposed UN cybercrime convention has both risks & opportunities for protecting vulnerable groups. By Isabella Wilkinson & Amrit Swali

2023-08-16

Staying Ahead Of Cyberthreats

Best Cybersecurity Practices For Businesses Of All Sizes: In the digital world cybersecurity is no longer an option for businesses, but a necessity.

2023-08-15

Protecting Against The $6.7Bn SMS Pumping Fraud Scam

Warning: Criminals can exploit businesses who use SMS One-Time Passwords as part of a two-factor authentication process. By Paul McGuire 

2023-08-15

Beyond Traditional Security

Embracing CNAPP For Enhanced Cloud Application Protection: One of the most viable solutions to enhance app security in the modern setting.

2023-08-14

DORA: Compliance With The EU Digital Resilience Act

The deadline for complying with the new DORA rules is approaching. What is it & what are the risks of non-compliance? By Christopher Gill

2023-08-14

Understanding Malvertising Attacks

Lack of awareness, plus easier access to AI tools, provides the perfect cocktail for even inexperienced threat actors to exploit. By Tom McVey

2023-08-14

Embracing The Passwordless Future

Strengthening Security & User Experience: Passwords are not only a security risk but also a big source of frustration for users. By Mesh Bolutiwi

2023-08-11

Massive Breach Of British Voter Data

Unknown hackers have obtained the details of tens of millions of British voters in a complex cyber attack on the Electoral Commission.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

CERT.BY

CERT.BY

The National Computer Emergency Response Team of the Republic of Belarus.

SK-CERT

SK-CERT

SK-CERT National Computer Computer Emergency Response Team of Slovakia.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Cyvatar

Cyvatar

Cyvatar is a technology-enabled cyber security as a service (CSaaS) provider delivering smarter managed security to help you achieve compliance and security faster and more efficiently.

Apono

Apono

Apono enables DevOps and security teams to manage access to sensitive cloud assets and data repositories in a frictionless and compliant way.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

WheelHouse IT

WheelHouse IT

WheelHouse IT secures, manages, and advances businesses with innovative, cost-effective IT solutions.

Salus Cyber

Salus Cyber

Salus is a provider of world-class cyber security services, enabling our clients to identify and manage their cyber risks proactively and effectively.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

SIGLA Group

SIGLA Group

SIGLA Group specialize in the design and development of IT and OT solutions, from analysis to design, from implementation to commissioning, as well as consultancy, training and assistance.

Dotsquares

Dotsquares

Dotsquares leverage the latest web and mobile technologies to build, grow and support your business.

EmberOT

EmberOT

EmberOT is at the forefront of operational technology (OT) security, offering cutting-edge solutions designed to protect critical infrastructure within energy, utilities, and manufacturing sectors.