FREE TO VIEW


« Back to News

2025-02-07

Combating Cyber Threats In The Age Of AI 

AI-powered tools are driving the many ways that cybercriminals deceive businesses into exposing their most sensitive information. By Phil Calvin

2025-02-07

Managing Dark Web Exposure In 2025

Navigating The Shadowy Frontiers: The dark web’s trade in stolen data presents several big challenges for organisations. By Vishaal Hariprasad

2025-02-12

British Cyber Code Of Practice For Developing AI

The code applies to developers, system operators, and data custodians at organisations that create, deploy, or manage AI systems.

2025-02-11

Hackers Innovate To Attack Microsoft 365 Accounts

High Speed Brute Force: Hackers have been using HTTP client tools for sophisticated account takeover attacks on Microsoft 365 environments.  

2025-02-07

Australia Bans DeepSeek In Government Networks

Backlash: Australia has banned DeepSeek from all their government systems because of what it says is an unacceptable national security risk.

2025-02-13

Texas Creates Its Own Cyber Command Center

Texas is the eighth largest economy in the world, with numerous Oil, Gas, Financial & Military targets for cyber criminals and nation state actors.

2025-02-11

Ransomware Attack on Tata Tech

Tata Technolgies, a major service supplier to government and the automotive, aerospace, and heavy machinery industries discloses a data breach.

2025-02-07

Google Reports Widespread Misuse Of Gemini AI

Google’s says that Iran is the leading state actor exploiting Gemini, its AI-powered chatbot, for hacking, espionage & information warfare.

2025-02-06

File Transfers Can Be The Weakest Link

File transfers need to be easy, quick and most of all, safe. But that requires more than just a traditional email gateway solution. By Richard Bourne

2025-02-05

A History Of Artificial Intelligence And Its Current & Future Development [extract]

AI Is No Longer A Technology Of The Future: It is a technology that already impacts all of us, ranging across many different applications.

2025-02-05

Cyber Threat Forecast Part 2 - India   

Strained relations across South Asia, as well as between India & nation-states further afield, threatens an explosion of cyber activity. By Craig Watt

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

vArmour

vArmour

vArmour is the industry’s first distributed security system that provides insight and control for multi-cloud environments.

CERT-UG/CC

CERT-UG/CC

CERT-UG/CC is the national Computer Emergency Response Team for Uganda, operating under the National Information Technology Authority (NITA-U)

Cybertech

Cybertech

Cybertech Conference & Exhibition presents commercial problem solving strategies and solutions for the global cyber threat that meet the diverse challenges for a wide range of sectors.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Cloudrise

Cloudrise

Cloudrise are elevating cloud security, data protection, and privacy through assessment, technology enablement, and process automation.

Crypto International

Crypto International

Crypto International offers comprehensive services for the operation of our customers’ IT and communication infrastructure, with a focus on cybersecurity and encryption solutions.

Bleckwen

Bleckwen

Bleckwen is a proven fraud detection system that helps financial institutions build trust with customers.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Secure Halo

Secure Halo

Secure Halo has been protecting the intellectual assets and sensitive information of the federal government and private sector for 20+ years, through our proactive approach to risk and cybersecurity.

Somos

Somos

From voice to messaging to fraud prevention and beyond, Somos are committed to developing innovative solutions that ensure that our ability to maintain trustworthy connections never stops.