FREE TO VIEW


« Back to News

2024-01-22

Hackers Attack Leading Investment Bank

Davos Blues: Bankers & regulators express concern over the growing wave of cyber attacks on financial services being reinforced with AI.

2024-01-19

Five Security Benefits Of Application Mapping

By following the best practices for application mapping, organizations can maximize the security & efficiency of their business operations.

2024-01-19

Is Artificial Intelligence The Answer To The Cybersecurity Skills Shortage?

The shortage of skilled cybersecurity workers remains a significant and ongoing issue, but can AI provide solutions to the ongoing labor shortfall?

2024-01-19

Deepfakes Designed To Mislead Voters

Deepfakes & Misinformation: A recent survey suggests that many British voters could be vulnerable to fake news and misinformation campaigns.

2024-01-18

A Rolling Campaign Of Russian Inspired DDoS Attacks

NoName Hacktivists: HTTPs-based attack vectors designed to consume targets' bandwidth & resources using a standard DDoS tool.

2024-01-18

Fujitsu Knowingly Supplied Faulty Data To The British Post Office 

Defective National IT System: Fujitsu and Post Office management concealed data problems which led to hundreds of unjust criminal convictions.

2024-01-17

Cyber Security Is A State Of Mind

Effective Cyber Security Is A Mindset: The awareness and collaboration of the entire team are vital in preventing and mitigating cyber risks.

2024-01-12

US Space Force Has Plans To Use Artificial Intelligence 

As organisations continue to launch platforms and space-based systems, AI is expected to play a pivotal role in maintaining their operations.

2024-01-11

Apple Will Pay Compensation For Slowing Down iPhones

Apple will pay $500 million in compensation to settle a class action lawsuit over the claims that it deliberately slowed down certain model iPhones. 

2024-01-15

Are Your AWS Databases Secure? Critical Best Practices

AWS Databases offer a scalable, reliable, and secure environment for storing & retrieving data, making them a crucial part of cloud deployments.

2024-01-12

The Benefits of Regular Penetration Testing

Penetration testing is an integral part of strong security systems and central to uncovering weakness & fixing them before threat actors exploit them.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Maritime Cyber Alliance

Maritime Cyber Alliance

Maritime Cyber Alliance was established in 2017 by Airbus , CSOAlliance , MCSA & Wididi to provide a medium for both public Cyber Safety advice and for businesses to discuss Cyber concerns.

G Data CyberDefense

G Data CyberDefense

G DATA developed the world's first antivirus software, and we have remained pioneers in innovation for IT security ever since.

Cyber Academy

Cyber Academy

Cyber Academy is one of the first institutions in the SE Europe region that provides a hands-on program in cyber security, blockchain and AI.

Absio

Absio

Absio provides the technology you need to build data security directly into your software by default, and the design and development services you need to make it happen.

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet

Technology Ireland ICT Skillnet is a network of companies who collaborate to address skills needs within the technology sector.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

CICRA Consultancies

CICRA Consultancies

Cicra Consultancies is a company that specializes in cyber security. Our major activities are guided by three main principles: Prevent, Investigate, Prosecute.

Analog Devices Inc (ADI)

Analog Devices Inc (ADI)

Analog Devices is uniquely positioned to deliver security at the edge, where the data is born, because our sensor solutions convert the physical, analog world into the digital world.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Purple Knight

Purple Knight

Purple Knight is a free Active Directory security assessment tool built and managed by an elite group of Microsoft identity experts.

Apura Cybersecurity Intelligence

Apura Cybersecurity Intelligence

Apura is a Brazilian company that develops advanced products and provides specialized services in information security and cyber defense.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.