FREE TO VIEW


« Back to News

2024-01-23

Microsoft Is The Most Commonly Used Alias In Phishing Attacks 

Widespread use of AI is leading to a higher volume of phishing campaigns that will be barely distinguishable from genuine company communications.

2024-01-23

Cyber Attacks Hit Three English Councils At Once 

​​​​​​​Hackers have disrupted online operations in the county of Kent, affecting three town councils and taking down multiple online services.

2024-01-22

Hackers Attack Leading Investment Bank

Davos Blues: Bankers & regulators express concern over the growing wave of cyber attacks on financial services being reinforced with AI.

2024-01-19

Five Security Benefits Of Application Mapping

By following the best practices for application mapping, organizations can maximize the security & efficiency of their business operations.

2024-01-19

Is Artificial Intelligence The Answer To The Cybersecurity Skills Shortage?

The shortage of skilled cybersecurity workers remains a significant and ongoing issue, but can AI provide solutions to the ongoing labor shortfall?

2024-01-19

Deepfakes Designed To Mislead Voters

Deepfakes & Misinformation: A recent survey suggests that many British voters could be vulnerable to fake news and misinformation campaigns.

2024-01-18

A Rolling Campaign Of Russian Inspired DDoS Attacks

NoName Hacktivists: HTTPs-based attack vectors designed to consume targets' bandwidth & resources using a standard DDoS tool.

2024-01-18

Fujitsu Knowingly Supplied Faulty Data To The British Post Office 

Defective National IT System: Fujitsu and Post Office management concealed data problems which led to hundreds of unjust criminal convictions.

2024-01-17

Cyber Security Is A State Of Mind

Effective Cyber Security Is A Mindset: The awareness and collaboration of the entire team are vital in preventing and mitigating cyber risks.

2024-01-12

US Space Force Has Plans To Use Artificial Intelligence 

As organisations continue to launch platforms and space-based systems, AI is expected to play a pivotal role in maintaining their operations.

2024-01-11

Apple Will Pay Compensation For Slowing Down iPhones

Apple will pay $500 million in compensation to settle a class action lawsuit over the claims that it deliberately slowed down certain model iPhones. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Simility

Simility

Simility's multi-layered fraud detection solution uses superior machine learning & device intelligence technology to safeguard your online businesses.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

ISARR

ISARR

The ISARR software platform - your bespoke Risk, Resilience & Security Management solution. Simple, cost effective and adaptable, now and into the future.

Hub71

Hub71

Hub71 is a world-class tech ecosystem opening doors to global opportunities from an optimal business environment for entrepreneurial-minded innovators.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.

Judy Security

Judy Security

Judy provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.