NEWS > Cybersecurity News


« Back to News

2023-10-19

The Duality of Cybersecurity

Cybersecurity Awareness Month: Seven industry experts share their insight to help organisations navigate the complexities of cybersecurity.

2023-10-18

Ukraine’s Cyber Conflict With Russia

The cyber conflict in Ukraine has evolved since Russia's initial invasion attempt failed. Patterns of hostilities and even some rules have emerged.

2023-10-13

DNA Testing Service 23andMe Hacked

20m Pieces of User Data Stolen: Information lost includes names, usernames, profile photos, geographical location & genetic ancestry results.

2023-10-16

IoT Security Needs A Human Touch 

Internet of Things: The level of trust in IoT technology among users, in terms of its security and social utility, has a lot of room for improvement.

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-17

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal

Hacktivist groups have joined the conflict online, disrupting government websites, civil services & financial institutions. By Jeremiah Fowler

2023-10-13

Domain Phishing: Antidotes In Today’s Market

Phishing Threats: Doubling down on security measures is the key to protecting not only your web address but your business brand. By Brian Lonergan

2023-10-10

Sony Falls Victim To CLop Ransom Attack

Sony Interactive Entertainment has confirmed that the personal information of thousands of former & current employees has been exposed.

2023-10-09

Police Access To Passport Database 'risks public trust'

Plans to integrate the UK Police National Database and Passport Office data will enable police to find a facial match with the 'click of one button'.

2023-10-09

Garbage In / Garbage Out: Training AI Algorithms

One of the risks posed by AI technology is the significant security threat to the vast data needed to train their algorithms & improve performance.

2023-10-09

Cyber Incidents At British Firms Up 25%

Less than half of British companies are confident in their ability to handle the biggest threats facing organisations, including phishing & malware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

D-Fence

D-Fence

D-Fence high availability security service protects corporate email communication, the company and it's employee's against cyber threats.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

HarfangLab

HarfangLab

HarfangLab develops a hunting software to boost detection and neutralization of cyberattacks against companies endpoints.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Denodo

Denodo

Denodo transforms the way organizations operate by unifying their data assets in real time and making data ubiquitous and secure to all users and business applications.

Diversified Technical Services Inc. (DTSI)

Diversified Technical Services Inc. (DTSI)

DTSI provides a wide range of technology solutions for Federal Agencies, the Department of Defense, and commerical organizations with capabilities including Cyber Security and DevSecOps.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.