NEWS > Cybersecurity News


« Back to News

2023-05-09

Challenges For CTOs In 2023

Being a CTO in 2023 has to be recognised as one of the most demanding yet fulfilling executive roles on the Board. By Chris Carreiro

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-19

British Cyber Security Agency Issues An Alert

Russian Hackers Target Critical Infrastructure: Russia seeks to "disrupt or destroy" Britain's critical infrastructure, Cabinet Office warns.

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-04-24

Israeli Hacking Spyware In Widespread Use

New Israeli-made spyware resembling NSO Group's notorious Pegasus malware has been used to target journalists & politicians in many countries.

2023-04-17

Pakistan's Hackers Attack India's Education Sector

Transparent Tribe: A shift from attacking Indian military & government targets to disrupting educational institutions across India.

2023-04-14

Highly Evasive Adaptive Threats & Advanced Persistent Threats

There's a new kind of attacker, one that has learned to weaponize the most crucial tool for knowledge workers today - the web browser. By Mark Guntrip

2023-04-13

What The West's Caution Over Chinese Tech Really Means

The focus on China as a malicious security threat is somewhat of a distraction. The real battle is in military and economic power. By Dario Betti

2023-04-17

FBI Seizes $112m From 'CryptoRom' Criminals

Cryptocurrency Romance: A $multimillion fraud involves faking a romantic interest in the victim, linked to crypto currency investment scams.

2023-04-14

Japan’s Leading Companies Exposed To Ransomware

An attack on the Japanese IT company Fujitsu could cause a surge in ransom attacks by criminal hackers on companies & their customers.

2023-04-11

Increasing Cyber Attacks On Critical Infrastructure

Cyber attacks can have real-world consequences and recent 'near miss' incidents show just how disruptive the impact can be.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Backup Systems

Backup Systems

Backup Systems is a leading backup and disaster recovery systems provider across the UK.

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

CMMI Institute

CMMI Institute

CMMI Institute enables organizations to elevate and benchmark performance across a range of critical business capabilities, including product development, data management and cybersecurity.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

The Cyber AB

The Cyber AB

The Cyber AB is the official accreditation body of the Cybersecurity Maturity Model Certification (CMMC) Ecosystem.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

EnigmaSoft

EnigmaSoft

EnigmaSoft is known for its PC anti-malware remediation utility and service under the tradename SpyHunter.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

Globant

Globant

Globant is an It and software development company. We leverage the latest technologies and methodologies to help organizations transform in every aspect, including software security.

Sectyne

Sectyne

Sectyne is a full-stack cyber consultancy committed to providing tailored services, advisory consultations, and training.

Mailinblack

Mailinblack

Mailinblack protects your organisation against email threats with an innovative solution that meets your security requirements.

Zigrin Security

Zigrin Security

Zigrin Security offer comprehensive, hands-on security testing of internal networks, applications, cloud-based solutions, e-commerce applications and mobile devices.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

Brunswick Group

Brunswick Group

Brunswick is a critical issues firm. We advise the world’s leading companies on how to navigate the critical issues they face and engage with their critical stakeholders.

Velstadt Cybersecurity

Velstadt Cybersecurity

Velstadt's team of experienced professionals works on identifying vulnerabilities, analyzing threats, and developing strategies to ensure the highest level of security.