FREE TO VIEW


« Back to News

2024-01-15

Are Your AWS Databases Secure? Critical Best Practices

AWS Databases offer a scalable, reliable, and secure environment for storing & retrieving data, making them a crucial part of cloud deployments.

2024-01-12

The Benefits of Regular Penetration Testing

Penetration testing is an integral part of strong security systems and central to uncovering weakness & fixing them before threat actors exploit them.

2024-01-09

Six Remarkable Ways AI Is Driving Innovation

Artificial Intelligence has emerged as a cornerstone of innovation in the 21st century, reshaping how industries operate & conceive the future.

2024-01-17

AI Will Affect 40% Of All Jobs

Profound Change: A technological revolution that could jumpstart productivity, boost global growth & raise incomes around the world. And cost jobs.

2024-01-15

Enormous Leak - Brazil’s Population Data Exposed

Unsecured Cloud Data On 223m People: Full names, date of birth, sex and the 11-digit number which identifies individual taxpayers in Brazil.

2024-01-15

The Cybersecurity Skills Gap Is Not Just A Numbers Game

A mass recruitment drive is unlikely to provide an effective solution. Training and retaining skilled staff are the key issues. By Jamal Elmellas

2024-01-12

Might AI Influence Big Elections In 2024?

Fake Information: In 2024 elections all around the world are facing evolving threats from external interference using Artificial Intelligence tools.

2024-01-12

China Cancels Encryption

Chinese researchers say the power of Quantum computing to break any form of encryption is more readily accessible than first thought.

2024-01-04

CSPM: Trends & Predictions For 2024

Cloud Security Posture Management: CSPM is a vital component of cloud security which is set to undergo significant transformations in 2024.

2024-01-10

The AI Skills Gap Is Hurting Britain

As the UK looks to become an AI superpower, the skills gap in the public sector needs to be addressed, with new incentives & benefits. By Sascha Giese

2024-01-08

Abduction & Extortion Goes Online

Cyber Kidnapping: Criminals coerce a victim to stage their own kidnapping and film it, providing blackmail material against their own families.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

Logicalis

Logicalis

Logicalis are a leading provider of global IT solutions and managed services.

Lantronix

Lantronix

Lantronix is a global provider of secure data access and management solutions for Internet of Things (IoT) and information technology assets.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Hornetsecurity

Hornetsecurity

Meet Hornetsecurity – Leading Cloud Email Security Provider. We protect global organizations so you can focus on what you do best.

LinkUp

LinkUp

LinkUp is a leading data-driven job search company. Every day we index millions of job openings directly from employer websites.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Horizon3.ai

Horizon3.ai

Horizon3.ai is a leader in security assessment and validation enabling continuous security overwatch from an attacker’s perspective through our NodeZero SaaS solution.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.