NEWS > Cybersecurity News


« Back to News

2024-05-01

Russian Hackers Are A Global Threat

Sandworm: Mandiant report on widespread operations and exploits of sabotage & electoral interference serving Russian geopolitical interests.

2024-04-30

The NCSC Appoints A New Chief

Richard Horne has been appointed the new CEO of the British National Cyber Security Centre, joining the board of the GCHQ spy agency.

2024-04-30

AWS & Google Agree To Drop Cloud Service Exit Fees

Data Portability & Cloud Interoperability: A multicloud strategy is becoming less expensive, optimising the flow of data. By Jamil Ahmed

2024-04-29

Facing The Quantum Challenge

The End Of Encryption: The potential of quantum computing is undeniable, but so is the threat it poses to our digital security. By Jason Soroko

2024-04-24

US Legislators Want TikTok's Chinese Owners To Divest 

Election Year: TikTok could be banned in the US over urgent concerns about user data & electoral influence if the Chinese owners don't sell their stake.

2024-04-23

EU Threatens TikTok Lite With Suspension

Money-for-Views: The European Union has demanded TikTok provide more information about a new app that pays users to watch videos.

2024-04-29

Securing The Paris Olympic Games

Disinformation & Cyber Crime: The 2024 Paris Summer Olympics are imminent and the organisers are focusing on the cybersecurity challenge.

2024-04-22

Phishing-as-a-Service Platform LabHost  Is Turned Over

One of the most popular phishing-as-a-service platforms has been smashed in a law enforcement operation coordinated by Europol.

2024-04-18

The Cyber Security Skills Gap Is A Chicken & Egg Problem

New Starter Jobs: Openings for experienced candidates outnumber those for entry level positions by a ratio of two to one. By Jamal Elmellas

2024-04-17

Iranian Hackers Targeted Israel’s Radar Systems

An Iranian hacking group named Handala has published a statement on social networks, claiming that they penetrated Israel's radar defences.

2024-04-24

Cyber Threats To British Elections

Election Year: British voters are facing a significant increase in nation-state hacking activities, fake news and disinformation in 2024.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Hyper Recruitment Solutions

Hyper Recruitment Solutions

Hyper Recruitment Solutions is a specialist and highly compliant recruitment consultancy dedicated to the Science and Technology sectors.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Italian Association of Critical Infrastructure Experts (AIIC)

Italian Association of Critical Infrastructure Experts (AIIC)

AIIC acts as a focal point in Italy for expertise on the protection of Critical Infrastructure including ICT networks and cybersecurity.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

National Institute of Information and Communications Technology (NICT)

National Institute of Information and Communications Technology (NICT)

NICT is Japan’s sole National Research and Development Agency specializing in the field of information and communications technology.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Rogue Wave Software

Rogue Wave Software

At Rogue Wave, our mission is to simplify your hardest problems, improve software quality and security, and shorten the time it takes to deliver value.

Vicarious

Vicarious

Vicarious identify the vulnerabilities in the software without involving the vendor and protect it before the hackers take advantage of it, even in compiled applications.

Internap Corporation (INAP)

Internap Corporation (INAP)

INAP is a global provider of high-performance data center and cloud solutions, partnering with customers worldwide to create secure and scalable IT infrastructure solutions.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

BlackFog

BlackFog

BlackFog is a leader in device data privacy, data security and ransomware prevention. Our behavioral analysis and anti data exfiltration technology stops hackers before they even get started.

FortKnoxster

FortKnoxster

FortKnoxster is a cybersecurity company within the Crypto & FinTech space. Our encryption technologies are blockchain integrated.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.