NEWS > Cybersecurity News


« Back to News

2023-09-26

Severe Risks From Remote Access Exposure

Response Time: Organisations are finding it difficult to manage their attack surfaces at a speed & scale necessary to combat threat actor automation.

2023-09-25

Unmasking The Silent Threat Of Cryptojacking 

Zombie Devices: Unlike ransomware, cryptojackers want to remain in the system for as long and quietly as possible. By Spencer Starkey

2023-09-25

Zero-Trust: Protecting From Insider Threats

Unintended Consequences: Organisations need to constantly guard against insider threats - the cybersecurity risk that comes from within.

2023-09-22

Jargon Buster: Untangling The Complexity In Cybersecurity 

Device Security Affects Us All: Wouldn’t it be helpful to return to basics to explain & design security in a much easier way? By Chris Meidinger

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

2023-09-18

Navigating Priorities: Cloud vs Cyber For SMEs

In joining the widespread migration to Cloud Technology, SMEs must weigh the benefits against potential security and privacy risks. By Mark Allen

2023-09-19

The Slots Fall Silent

Update: Casinos in Las Vegas and other US locations have been held to ransom, with every area of business affected, from reservations to gaming.

2023-09-12

Fourth Industrial Revolution

The world is changing faster than ever with the 4th Industrial Revolution and we need a more agile approach to regulation, that supports innovation.

2023-09-09

An 8% Spike In Cyber Attacks

New research reveals a surge in global weekly cyber attacks in the second quarter of 2023 and identifies the escalation in the use of ransomware.

2023-09-04

How To Combat Cyber Security Burnout

Burnout Syndrome Is Real: Stop this happening to your cyber security team by automating and consolidating technologies. By Diana Harter

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Center for a New American Security (CNAS)

Center for a New American Security (CNAS)

CNAS is the nation's leading research institution focused on defense and national security policy. Cyber security issues are an intrinsic element of the national security debate.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Cyber Triage

Cyber Triage

Cyber Triage is an automated incident response software any company can use to investigate their network alerts.

Kryptus

Kryptus

Kryptus provides a wide array of solutions for hardware, firmware and software ranging from semiconductors to complex digital certificate management systems.

StormWall

StormWall

StormWall is an Anti-DDoS protection service for websites and networks. We offer 100% protection from all types of DDoS attacks and 24/7 technical support.

Totalsec

Totalsec

Totalsec is a Grupo Salinas company with a team of professionals in cybersecurity and information security providing Security Consulting, Solutions Integration, and Managed Security Services.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Ravelin Technology

Ravelin Technology

Ravelin prevents chargebacks, fraud, and account takeover. Machine learning and human insight combine for highly accurate fraud detection and prevention.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Trustify

Trustify

Trustify is a Managed Security Service Provider offering a suite of world-class Cyber Risk Management services.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

ON-DEMAND WEBINAR: 2024 and beyond: Top six cloud security trends

Learn about the top cloud security trends in 2024 and beyond, along with solutions and controls you can implement as part of your security strategy.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

Flare Systems

Flare Systems

Flare proactively detects and remediates exposure across the clear & dark web, providing organizations with the equivalent of an automated cyber reconnaissance team.