NEWS > Cybersecurity News


« Back to News

2024-05-28

Facial Recognition Technology Defects

Misidentified: Facial recognition technology produces inaccurate results and its widespread deployment risks dangerous consequences.

2024-05-24

Staff Data Breach: British Police Could Be Fined £750k

The Police Service of Northern Ireland faces a penalty for a major data breach after mistakenly exposing names of thousands of serving officers.

2024-05-24

Time For Cyber Force

An Inflection Point: Russia & China have their Cyber Forces and, after much prevarication, it is now time for a U.S. Cyber Force. By Ron Marks

2024-05-24

New Guidance For Business Email Compromise

Britain's NCSC has issued new BEC guidance, including practical steps to reduce the chances your organization suffering from these attacks.

2024-05-24

GDPR Is Six Years Old: What Is Its Impact On AI?

GDPR 6th Anniversary: GitLab, Vanta, Pipedrive & PagerDuty comment on this innovative & consequential EU data protection regulation.

2024-05-28

Chatham House Cyber Conference

London 5th June: Join cybersecurity experts to explore the ever-changing digital world at the Chatham House 2024 Cyber Conference. 

2024-05-21

MOD Data Breach Shows Supply Chain Security Continues To Be A Top Priority

The most critical data assets need the highest level of protection. That means prioritizing data based on the potential impact if it is compromised. 

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

Focus On Black Basta Ransomware

US cyber defence agencies have issued a joint advisory intended to help organizations mitigate the impact of prolific & costly 'Black Basta' malware.

2024-05-20

A Critical Vulnerability In The Post-PSTIA Era 

The Human Factor: To truly fortify our cybersecurity in this new era, we must address the elephant in the room. By James O'Sullivan

2024-05-17

Christie's Auctions Knocked Offline

Spring Sales: The prestigious art auction house has suffered a systems outage affecting forthcoming sales of items worth many $millions.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Qubitekk

Qubitekk

Qubitekk has developed quantum cryptography solutions for the machine-to-machine (M2M) communications market.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Veracity Industrial Networks

Veracity Industrial Networks

Veracity provides an innovative industrial network platform that improves the reliability, efficiency, and security of industrial networks and devices.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

Supra ITS

Supra ITS

Supra ITS is a leading full-service technology partner offering IT Consulting, Cloud Services, 24x7 Managed IT & Cybersecurity Services, and IT Project Support.

Bestman Solutions

Bestman Solutions

As a specialist cyber security practice, we believe that people are an organisation’s most valuable asset. Success depends on hiring the right people, and this is where we come in.