NEWS > Cybersecurity News


« Back to News

2024-02-20

23andMe Sparks A Rethink About Safeguarding Critical Data

On-Premises Vs Hybrid Cloud Strategies: A key question for many organisations today is that of where and how they host their data. By Mark Grindey

2024-02-27

Deepfake 'Face Swap' Attacks Trending

Deepfake attacks using misleading “face swap” technology, with the aim to bypass remote identity verification, have increased sevenfold in 2023.

2024-02-23

British Library Still In Recovery

The British Library is using 'work around arrangements' to make critical payments to authors as it struggles to recover from a ransom attack.

2024-02-20

Malicious Microsoft Cloud Account Takeover Campaign

Cyber Criminals Follow Businesses Into The Cloud: Basic corporate account credentials are a lucrative potential source of money & further exploits.

2024-02-09

Facebook Changed the World

Global Social Impact: By monetising its users' personal data, Facebook proved that collecting our likes and dislikes is extremely lucrative.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

2024-02-09

Chinese Hacking Campaign Targets US Critical Infrastructure

Widespread Offensive Cyber Operations: Chinese hackers are implanting malware to disrupt daily life, were the US and China ever to go to war.

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-05

Military Service Is An Ideal Background For A Cybersecurity Career

Addressing The Cybersecurity Talent Shortfall: Recruiters can tap into the rich diversity of skills offered by Armed Forces veterans. By Chip Daniels

2024-02-05

On Trend - Hybrid Cloud Strategies

Cloud Repatriation: Many IT leaders are returning their network systems to on-premises infrastructure, due to unexpected security & cost issues.

2024-01-31

Lush Employee Data Stolen

Passport Scans: The Akira ransom gang claims to have stolen 110 GB of critical employee data from the international cosmetics business.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

BooleBox

BooleBox

Boolebox is the innovative suite of enterprise data protection applications that preserve the integrity and confidentiality of data from any unauthorized access.

AXELOS

AXELOS

AXELOS develops best practice frameworks and methodologies used globally by professionals working primarily in IT management and cyber resilience.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Lexsynergy

Lexsynergy

Lexsynergy is a global domain name management and online brand protection company.

Cybriant

Cybriant

Cybriant Strategic Security Services provide a framework for architecting, constructing, and maintaining a secure business with policy and performance alignment.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

Oz Forensics

Oz Forensics

Oz Forensics is a global leader in preventing biometric and deepfake fraud. It is a developer of facial Liveness detection for Antifraud Biometric Software with high expertise in the Fintech market.

Arista Middle East

Arista Middle East

Arista Middle East is part of Global Arista Technologies specializing in OT Cybersecurity.

Paramount Defenses

Paramount Defenses

Paramount Defenses have unrivaled capability in two of the most critical areas in cyber security today – Active Directory Security and Privileged Access.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.