FREE TO VIEW


« Back to News

2024-07-12

The Growing Menace Of Ransomware

Understanding & Combating The Threat: By adopting proactive, multi-layered defences, businesses can reduce their vulnerability. By Pravesh Kara

2024-09-02

Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-07-10

Navigating The Complexities Of Data Backups In A Hybrid World

Going Hybrid: Many businesses mistakenly believe that cloud providers handle all backup needs, but this is usually not the case. By Brent Torre

2024-07-09

Breach Exposes Millions Of Mobile Numbers To Phishing Attacks

30m Users Exposed: Unidentified threat actors have exploited an unauthenticated endpoint in Authy’s MFA platform.

2024-07-11

Half Of Employees Don’t Report Security Mistakes

Despite increased security awareness training, more than half of cyber security professionals share concerns over security behaviours.

2024-07-09

Chinese Hackers Exploit Cisco Vulnerability To Deliver Malware

Velvet Ant: A command injection exploit that allows an authenticated, local attacker to execute arbitrary commands without syslog alert messages.

2024-07-05

Inside The Mind Of A CISO

The AI Express: CISOs are divided in their attitude over what AI will mean for their organization and their own roles. By Nick McKenzie 

2024-07-05

UK vs. US: The Artificial Intelligence Landscapes Compared

Innovation Vs Pragmatism: While the US and UK are at the forefront of AI development, their approaches diverge significantly. By Bill Conner

2024-07-02

Cyber Threats To The British Elections

Imminent General Eelection: Threat actors could seek to exacerbate domestic political divisions regarding the primary electoral issues.

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-03

London Hospitals Were Attacked By Russian Hackers

An attack on the NHS was accurately predicted months before Russia's Qilin hackers struck London hospitals in a supply chain exploit.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Semperis

Semperis

Semperis is an enterprise identity protection company that enables organizations to quickly recover from accidental or malicious changes and disasters that compromise Active Directory.

DirectDefense

DirectDefense

DirectDefense is an information security services and managed services provider.

Squalio

Squalio

Squalio is an information technology group that delivers solutions and services for secure and effective IT management.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

CultureAI

CultureAI

CultureAI deliver intelligent cyber security awareness education and tools that build resilient security cultures where employees help defend.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

Cynalytica

Cynalytica

Cynalytica deliver pioneering cybersecurity and machine analytics technologies that help protect critical infrastructure, securely enable Industry 4.0 and help accelerate digital transformation.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Kodem Security

Kodem Security

Our mission is to make AppSec simple. Meet the world’s first dynamic software composition analysis platform. Only Kodem uses runtime intelligence to determine application risk.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Silence Laboratories

Silence Laboratories

Silence Laboratories is a cybersecurity company that focuses on the fusion of cryptography, sensing, and design to support a seamless authentication experience.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.

Prequel

Prequel

Prequel is your real-time problem detection and resolution platform, powered by the global reliability community.

London School of Emerging Technology (LSET)

London School of Emerging Technology (LSET)

LSET's Cyber Security Unit is your premier destination for comprehensive cybersecurity education and training.