NEWS > Cybersecurity News


« Back to News

2024-06-08

Original Darktrace Investor Found Not Guilty

Mike Lynch, an originator of Darktrace, has been cleared of US fraud charges after the $11bn sale of his software company, Autonomy, to HP.

2024-06-07

New Cyber Security Rules For Maritime Shipping

Impractical: Proposed rules to improve the resilience of US commercial shipping have attracted widespread criticism from the maritime industry.

2024-06-07

Donald Trump & Social Media

Ex-President Trump Rejoins TikTok: Despite his earlier intention to ban it while in office, candidate Trump has quickly attracted 3.6m followers.

2024-06-06

The Cyber Security Threat From Iran

Iran’s cyber operations are not limited to state infrastructure - they include harassment campaigns and attempts to intimidate individuals.  

2024-06-07

Fake News & Disinformation In Poland  

Destabilising European Elections: A fake news story saying Poles would be mobilized to fight in Ukraine was planted on a national news agency.

2024-06-05

Hackers Target Healthcare

Serious breaches have very dangerous implications for the healthcare industry, sharpening the focus on how to protect medical data.

2024-06-06

London Hospitals Held To Ransom

Update: Seven London NHS hospital trusts have cancelled non-emergency operations and blood tests following a ransom attack by Qilin hackers. 

2024-06-04

You’ve Got Mail

Why Secure & Responsible Email Is Key to Safeguarding Our Data: The consequences of misusing it can be severe. By Anita Mavridis

2024-06-04

Identities Are The Highest Priority Risk Area

Focus On Identity Management: Senior security leaders’ support for Zero Trust is increasing, but skills and budgets aren’t keeping pace.

2024-06-03

Increasing Software Cyber Resilience

A new ‘Code of Practice for Software Vendors’ will ensure that security is fundamental to developing and distributing products and services. 

2024-06-04

Hamlet’s IP & AI

Washington Drama: As US regulators turn their attention to Artificial Intelligence, they face many complicated issues to untangle. By Ron Marks

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Information Commissioner's Office (ICO)

Information Commissioner's Office (ICO)

The Information Commissioner's Office is an independent authority set up to uphold information rights in the public interest.

Cyber Security Centre - University of Hertfordshire

Cyber Security Centre - University of Hertfordshire

The Cyber Security Centre provides training, teaching and research in the fast paced topics of cyber security and digital forensics.

DataVantage

DataVantage

DataVantage data masking and data management software helps you prevent data breaches, pass compliance audits and meet regulatory requirements such as HIPAA and PCI DSS.

VigiTrust

VigiTrust

VigiTrust is a security firm specializing in cloud based eLearning programs, security compliance portals and providing security assessments.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

SEIRIM

SEIRIM

SEIRIM delivers cybersecurity solutions in Shanghai China specializing in Web Application Security, Network Security for SME's, Vulnerability Management, and serving as Managed Security as a Service.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.