FREE TO VIEW


« Back to News

2024-04-11

City Of Leicester Council Attacked

Britain's Leicester City Council has suffered a sophisticated attack by a known ransomware group after evidence was posted on the Dark Web.

2024-04-11

The AI Future: Three Tips For SMBs

SMBs must get proficient in using the best AI tools, processes & training to ensure they don’t fall victim to AI-powered criminals. By John Mutuski

2024-04-10

Mitigating The Growing Insider Risk

User Activity Monitoring & Behavioral Analytics: Helping organizations meet the goal of being more informed and more secure. By Mike Crouse

2024-04-10

Make Sure Your Disaster Recovery Plan Works When You Need It Most

Disaster Recovery Testing: Conduct detailed tests to verify your plan’s functionality and readiness for any type of crisis. By Nazy Fouladirad

2024-04-08

Securing Intellectual Property In The Generative AI Era

A Strategic Blueprint For Businesses: Advances in AI come with complex challenges for intellectual property management. By Roberts & Obradovic

2024-04-08

Safeguarding Law Firms Against APP Fraud

Authorised Push Payment Fraud: This costly new exploit is becoming one of the most significant threats to the UK’s legal sector. By Scott Newby

2024-04-09

The Importance Of Formal Verification Networks For Secure Software

The challenge of eliminating widespread software vulnerabilities is an urgent problem. New approaches are needed to mitigate risk. By Fabien Chouteau

2024-04-09

Increase security for your enterprise cloud with a next-generation firewall

New On-Demand Webinar: Modern enterprise application stacks need protection at various levels and with multiple capabilities. Watch Now

2024-04-08

Understanding The Threats & Opportunities Posed By AI

Arrested Development: Cybersecurity teams must quickly embrace the benefits that AI offers them to keep pace with cybercriminals. By Brian Martin

2024-04-08

The Future of VPN Technology: Emerging Trends & Innovations

Trends & Innovations: VPNs are at the forefront of securing our online experiences, and it is incredibly important to prioritize online safety.

2024-04-05

The US & Britain Reach Agreement On AI Regulation 

Common Approach: A landmark bilateral deal on AI as governments around the world seek to control and regulate emerging AI technology.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Prosperon Networks

Prosperon Networks

Prosperon Networks support SMB to Enterprise networks through the provisioning of network monitoring software, customisation, consultancy and installation.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

Secure Decisions

Secure Decisions

Secure Decisions focus on research and product development related to national security including information assurance, computer network defense, cyber security education, and application security.

Axiad IDS

Axiad IDS

Axiad IDS is a Trusted Identity solutions provider for enterprise, government and financial organizations.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

Hunters.AI

Hunters.AI

Hunters is the world's first autonomous hunting solution that leverages top-tier cyber expertise and AI to uncover hidden cyber threats.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

SolCyber

SolCyber

SolCyber, a Forgepoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are accessible and affordable for any organization.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.