NEWS > News Analysis


« Back to News

2023-03-13

Conflict Drives A Significant Increase In DDoS Attacks

Recent data analysis reveals increased DDoS attacks, combined with a significant link between geopolitical conflicts and these types of attacks.

2023-03-08

One Third Of Cyber Criminals Are Women

Unequal Female Engagement: A higher percentage of women participate in cyber crime than currently work in the cyber security industry.

2023-03-06

Detecting Digital Injection To Counter Deepfake Biometric Fraud 

IDLive Face Plus: Detecting digital injection attacks where fraudsters use hardware & software hacks to substitute biometric capture with fake images. 

2023-03-06

Cyber Criminals Are Quick To Use ChatGPT 

Cyber criminals have begun using OpenAI’s artificially intelligent chatbot to construct hacking tools, create deepfakes and generate malware.

2023-03-03

Banning Ransomware Payments - Will It Work? 

In the light of the ever-growing ransomware threat, what would be the impact banning ransomware payments and would it help? By Antony Hogg

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

Hackers Have Stolen GoDaddy's Source Code

GoDaddy has revealed that hackers gained access to its servers to install malware, with the potential to extort many of its hosting customers.

2023-02-27

Half Of British SMEs Have Been Attacked

Cyber criminals have identified SMEs as vulnerable because of new working practices, small IT teams and a lack of solutions knowledge. 

2023-02-21

Universities Targeted With Ransomware

Attacks On The Education Sector Up 51% In 2022: Two leading technical universities in Ireland and Israel have been struck by ransomware.

2023-02-20

Is Your Business Compliant With Data Sovereignty Requirements?

It is increasingly important for organisations to understand where their cloud data is stored and who holds the keys to that data. By Florian Malecki

2023-02-20

Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment 

Despite increased attacks criminals have experienced a 40% drop in their earnings, as more victims are refusing to pay the ransom demanded.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Aqua Security Software

Aqua Security Software

Aqua Security helps enterprises secure their cloud native applications from development to production, whether they run using containers, serverless, or virtual machines.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

Dell Technologies Capital

Dell Technologies Capital

At Dell Technologies Capital we lead investment in disruptive, early-stage startups in enterprise and cloud infrastructure.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Security Alliance

Security Alliance

Security Alliance provide bespoke cyber intelligence consulting and research services.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Avertro

Avertro

Avertro helps leaders manage the business of cyber. We help explain cybersecurity to executives, forecasting outcomes, right-sizing your spend, and validating your cyber strategy.

SkyePoint Decisions

SkyePoint Decisions

SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider.

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

CcHUB Cybersecurity Academy

CcHUB Cybersecurity Academy

CcHUB Cybersecurity Academy is an institute focused on refining raw, technical talents in cybersecurity.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

Gorilla Technology Group

Gorilla Technology Group

Gorilla specializes in video analytics, OT network security and big data to support a wide range of solutions for commercial, industrial, cities and government purposes.

Canadian Cyber Threat Exchange (CCTX)

Canadian Cyber Threat Exchange (CCTX)

The CCTX is Canada’s not-for-profit, private-sector cyber threat sharing hub and collaboration centre.