NEWS > News Analysis


« Back to News

2023-06-22

Progress Software Has Critical Hacking Vulnerabilities

MOVEit: CISA has identified that another software product has been exploited to breach multiple US federal agencies by “unattributed APT actors”.

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-21

Data Sovereignty

Cyber security is not just about IT, it is about data governance and the responsibility for that rests firmly with management. By Simon Pamplin

2023-06-19

Is It Possible To Trust AI Decision-Making In Cybersecurity?

AI's Use In Cybersecurity Is Still Evolving: How will this impact decision-making and can the results of its use be trusted? By Iam Waqas

2023-06-15

Analysing XeGroup’s Arsenal Of Cyberattack Methods

Highly Evasive Adaptive Threat Techniques: A new class of cyber threats that evade the usual range of protective tools & analysis. By Brett Raybould

2023-06-15

Year in Review: Biggest Application Security Breaches Of 2022

As cyber threats become more sophisticated, it is crucial for organizations to stay vigilant and take all necessary steps to prevent data breaches.

2023-06-14

Google's App Store - Full Of Spyware

Malicious Software Development Kit: Over 100 Android applications containing a spyware module have had 421 million downloads from Google Play.

2023-06-13

Meta Is Building A Rival To Twitter 

Zuckerberg Vs Musk: The proposed text-based network could allow users to follow accounts they already follow on Instagram and elsewhere.

2023-06-13

Manchester University Hacked

One of the UK's largest and most successful education & research centres has been breached with some of its critical data exposed.

2023-06-09

More Than 340 Million User Accounts Breached So Far This Year

A String Of Large Scale Incidents: In the first four months of 2023 business data breach incidents have already affected over 340 million users.

2023-06-08

A House Of Cards

The Risk Of Losing User Trust: The Capita incident showcases the importance of cybersecurity in Digital Transformation. By Paul Holland

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

A-SIT Secure Information Technology Center

A-SIT Secure Information Technology Center

A-SIT was founded in 1999 as a registered nonprofit association and is established as a competence center for IT-Security.

PartnerRe

PartnerRe

PartnerRe Ltd. provides multi-line reinsurance to insurance companies on a worldwide basis. Services include Cyber Risk.

CyberGuarded

CyberGuarded

CyberGuarded are an accredited vendor independent information security testing and auditing company.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Xilinx

Xilinx

Xilinx is the inventor of the FPGA, programmable SoCs, and now, the ACAP. We are building the Adaptable, Intelligent World.

Data Security Inc

Data Security Inc

Data Security, Inc. is the leading American manufacturer and supplier of hard drive degaussers, magnetic tape degaussers as well as hard drive and solid state destruction devices.

CyberWhite

CyberWhite

CyberWhite is a disruptive provider of cyber security and risk mitigation solutions.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

SharkStriker

SharkStriker

SharkStriker is a US based managed security services provider with SOCs and offices across the globe.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.