NEWS > Cybersecurity News


« Back to News

2023-01-20

Sexual Abuse & Harassment Of Women

Sexual harassment is rife in the cyber security industry, with women reporting being groped at events and receiving inappropriate content online. 

2023-01-14

2023 - Cyber Threats To US Infrastructure 

Malware attacks on healthcare & other critical infrastructure, plus the escalating costs of ransomware are focusing minds in the US government.

2023-01-13

British Royal Mail - 'Cyber Incident'

The Royal Mail’s overseas mail deliveries have been hit by a cyber attack, halting international deliveries until systems are restored.

2023-01-13

The FBI’s Advice On Ransomware

Part of the FBI's mission is to raise awareness about ransomware, using its global intelligence network to help victims respond and recover.

2023-01-11

2023 - Threat Intelligence Predictions

EIQ's Intelligence Team: Extortion will evolve, cyber criminals will take sides in Ukraine, Russia's cyberwar will fail and ChatGPT will take off.

2023-01-10

Chinese Spy Device Found Hidden In British Government Car

Concerns over the covert use of Chinese spyware prompted intelligence operatives to investigate British government & diplomatic vehicles.

2023-01-10

Five Data Security Trends Organisations Must Deal With

In 2023 business challenges of all kinds are growing more difficult to identify and solve. Data protection is one of them. By Florian Malecki

2023-01-09

Cybersecurity: Prepare For The Year Ahead

Back-to-Basics: Cybersecurity threats and regulation will evolve in the next year, yet many aspects will remain the same. By Simon Eyre 

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2022-12-22

Guardian Newspaper Suffers A Large Scale Ransomware Attack

IT Systems Hacked: Guardian newspaper employees have been told to work from home following a serious incident affecting network connectivity.

2022-12-22

Malaysian Airline Ransomware Attack

The Daixin Team hacking group has claimed responsibility for stealing the personal data of five million passengers & employees of AirAsia.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Secure360

Secure360

Secure360 focuses on the following key areas: governance, risk and compliance, information security, physical security, business continuity management, and professional development.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Conix

Conix

Conix offerings include Governance and Risk Management, Auditing and Penetration Testing, Digital Forensics, Managed Security Operations Centre (SOC).

Junglemap

Junglemap

Junglemap provide nanolearning training courses on ransomware, information security and GDPR.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Innova

Innova

Innova is Turkey's leading IT solutions company, providing platform independent solutions to organizations in telecommunication, finance, production, public and service sectors.

u-blox

u-blox

u-blox deliver leading wireless technology to reliably and securely locate and connect people and devices.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Chainlink

Chainlink

Chainlink expands the capability of smart contracts by enabling access to real-world data and systems without sacrificing the security and reliability guarantees inherent to blockchain technology.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

Archer Technologies

Archer Technologies

Archer helps organizations manage risk in the digital era—uniting stakeholders, integrating technologies and transforming risk into reward.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.