NEWS > Cybersecurity News


« Back to News

2024-06-12

Cyber Criminals Do Not Care Who Falls Victim

Attacks on Santander and NHS London demonstrate why cyber insurance should be part of every business' resilience strategy. By Marc Rocker

2024-06-10

Britain's Cybersecurity Business Is Booming

British Cyber Security Sectoral Analysis: The successful growth of the domestic cybersecurity industry is having a nationwide impact.

2024-06-12

Kinsing Malware Attacks Analysed

A Critical Threat: Kinsing targets cloud infrastructure, exploiting misconfigurations to rapidly spread attacks across numerous popular applications.

2024-06-11

Is Encryption Falling Out Of Favour?

An alarming number of organisations have gone backwards in protecting vital information, heightening the risk of data exposure. By Jon Fielding

2024-06-11

London Hospitals Still Offline After Cyber Attack

Update - Call For Blood Donors: Affected London hospitals are unable to match patients' blood for operations & have declared a critical incident.

2024-06-10

The Major AI Threats Cyber Security Teams Must Deal With

The Big Five: Cyber threats are shaping the future, with a focus on the increasingly sophisticated use of AI by attackers as well as defenders.

2024-06-10

Business Is Responding To AI Cyber Security Threats

Firefighting: Cyber security teams are rapidly changing their strategies to keep pace with emerging AI-based threats targeting businesses.

2024-06-08

Original Darktrace Investor Found Not Guilty

Mike Lynch, an originator of Darktrace, has been cleared of US fraud charges after the $11bn sale of his software company, Autonomy, to HP.

2024-06-07

New Cyber Security Rules For Maritime Shipping

Impractical: Proposed rules to improve the resilience of US commercial shipping have attracted widespread criticism from the maritime industry.

2024-06-07

Donald Trump & Social Media

Ex-President Trump Rejoins TikTok: Despite his earlier intention to ban it while in office, candidate Trump has quickly attracted 3.6m followers.

2024-06-06

The Cyber Security Threat From Iran

Iran’s cyber operations are not limited to state infrastructure - they include harassment campaigns and attempts to intimidate individuals.  

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

EuroISPA

EuroISPA

EuroISPA is a pan European association of European Internet Services Providers Associations and the world’s largest association of ISPs.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Verint Systems

Verint Systems

Verint is a leader in Actionable Intelligence with a focus on customer engagement optimisation, security intelligence, fraud, risk and compliance.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Cybrary

Cybrary

Cybrary is an open-source cyber security and IT learning and certification preparation platform.

Oak Ridge National Laboratory (ORNL)

Oak Ridge National Laboratory (ORNL)

ORNL conducts basic and applied research and development in key areas of science for energy, advanced materials, supercomputing and national security including cybersecurity.

Styra

Styra

Styra allows companies to secure cloud environments and applications, including those built on the popular Kubernetes open-source cloud platform.

IberLayer

IberLayer

IberLayer is the company behind the Email Guardian service, a cloud based Email Total Protection system that filters and blocks email threats.

Blue Cedar

Blue Cedar

Blue Cedar's mobile app security integration platform secures and accelerates mobile app deployment for enterprises and government organizations around the world.

Secuvant

Secuvant

Secuvant is an independent IT Security firm providing enterprise-grade IT security services to mid-market organizations.

Securious

Securious

If you need to improve your cyber security or achieve cyber security accreditations, Securious provide an independent service that will identify and address your issues quickly and efficiently.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.