FREE TO VIEW


« Back to News

2023-05-10

Climate Change & Cyber Security

The Natural World & Cyber Security Are Connected: In fact, climate change could be one of the biggest security threats the planet faces.

2023-05-09

Malware Disguised As Legitimate Android Apps

Fluhorse: Malicious apps designed to extract sensitive information, including user credentials and Two-Factor Authentication codes.

2023-05-09

Insurers Must Pay Merck's $1.4B Losses For NotPetya

Court Ruling: Merck's insurers can't use an "act of war" clause to deny the pharmaceutical firm's claim for the cleanup costs after NotPetya attack.

2023-05-09

Challenges For CTOs In 2023

Being a CTO in 2023 has to be recognised as one of the most demanding yet fulfilling executive roles on the Board. By Chris Carreiro

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

2023-05-05

Phishing Attacks Surge As Cyber Criminals Exploit New AI Tools

Beating 2FA: AI tools can help threat actors craft convincing phishing messages that are devoid of some typical indicators of a phishing attempt. 

2023-05-03

Retrofixing The Remote Workforce

Combining technologies over a single platform can provide a cohesive security solution that can monitor endpoints & network access. By Tim Wallen

2023-05-03

Is ISO 27001 Worth It?

The Only Auditable International Standard For Information Security: What are the relative pros & cons of ISO 27001 - is it worth it? By Phil Robinson

2023-05-03

Why Zero Trust Is Fundamental In Today’s Economic Climate

Harnessing affordable zero trust architecture based solutions is preferable to investing in multiple expensive solutions. By Dominik Birgelen

2023-05-01

Google Bans Thousands Of Malicious Developers

App Attacks: Google says it has blocked 173,000 malicious developers and fraud rings preventing over $2 billion in fraudulent transactions.

2023-05-01

‘Tyrannical IT’ Is A Critical Threat

Misinformation & Disinformation: Authoritarian countries increasingly rely on digital tools to suppress dissent both inside & beyond their borders.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

IP Performance

IP Performance

IP Performance Limited is a leading supplier of customised network infrastructure and security solutions.

Allianz

Allianz

Allianz Cyber Protect is a comprehensive cyber insurance provided internationally and tailored to your company´s risk profile.

SBS CyberSecurity

SBS CyberSecurity

SBS CyberSecurity is a premier cybersecurity consulting and audit firm.

ThreatSTOP

ThreatSTOP

ThreatSTOP is a cloud-based automated threat intelligence platform that converts the latest threat data into enforcement policies to stop attacks before they become breaches.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

Cyber Struggle

Cyber Struggle

At Cyber Struggle, our aim is training and certifying the special forces of the cyber world.

YL Ventures

YL Ventures

YL Ventures funds and supports brilliant Israeli tech entrepreneurs from seed to lead.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

Palmchip

Palmchip

Palmchip is a Cyber Security, SOC and Software consulting company. We design and develop high performance and secure applications.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

CrossCountry Consulting

CrossCountry Consulting

CrossCountry Consulting is a trusted business advisory firm that provides customized finance, accounting, human capital management, risk, operations and technology consulting services.

Bright Pixel Capital

Bright Pixel Capital

Bright Pixel Capital is a venture capital company with a focus on Cybersecurity, Retail Technologies, Digital Infrastructure and Emerging Technologies.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.