FREE TO VIEW


« Back to News

2023-07-31

Cyber Crime Claims Repeat Victims

Over 80% Attacked More than Once: Cyber crime attacks are costly and some businesses are finding themselves being targeted multiple times.

2023-07-24

The Security Challenge: Mapping & Securing Your Distributed Data

Why mapping your distributed data is necessary, what challenges you’ll face along the way, and how you can overcome them. By Dotan Nahum

2023-07-26

British Employees Lack The Training To Use AI Tools

Research from Salesforce shows that skills shortages at organisations across the UK pose serious challenges for the uptake of AI tools. 

2023-07-20

Sweden Issues An Order 'Stop Using Google Analytics'

Four Companies Fined; Customers' personal data was supplied to Google Analytics in a way that failed to meet EU technical security standards.

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-18

A Million British Medical Patient Records Hacked

Details potentially exposed include name & contact details, next of kin information, ID numbers, study details, ethnicity, and even disability codes.

2023-07-19

British Spy Agency Was Hacked 20 Years Ago

Two decades have passed since malware designed to evade detection & steal sensitive data was first detected on a British government device.

2023-07-17

SCADA Is Dead, Or Is It?

Advanced Manufacturing: The traditional automation pyramid has collapsed and the next generation of solutions has arrived. By Stefan Reuther

2023-07-11

Twitter Threatens To Sue Meta Over Threads App

The Friendly Alternative: Twitter is threatening legal action against Meta accusing it of poaching former employees to create a “copycat”.

2023-07-14

A “Whole-of-Society" Approach To Cyber Crime

Active Cyber Defence: Britain's NCSC was notified of a suspicious email or website every five seconds in 2022 - that's 7.1m suspicious incidents.

2023-07-11

Zero Trust: A Paradigm Shift in Cybersecurity

Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data and critical assets. By Helen Kruger

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Temasoft

Temasoft

TEMASOFT is a software company focused on developing security and infrastructure products.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Logit.io

Logit.io

Logit.io is a log analysis & management platform that provides a scalable solution for hosting the open-source tools Elasticsearch, Logstash, and Kibana.

Skudo

Skudo

Skudo is dedicated to creating innovative best-in-class solutions that protect data exchange with the highest level of security and privacy.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Prescient Solutions

Prescient Solutions

Prescient Solutions is a managed services provider, using a cloud-based model to provide IT solutions to small, mid-sized, global organizations and government entities.

Mosyle

Mosyle

Businesses and educational institutions rely on Mosyle to manage and secure their Apple devices and networks.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.