NEWS > News Analysis


« Back to News

2023-06-27

Canada Challenges Meta Over Access To News

Meta has announced it will shut down access to news on Facebook and Instagram in Canada in a dispute over payment to local sources.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-08-07

Email Impersonation Attacks Reach All-Time High

Email impersonation comprises over 90% of threats observed in corporate inboxes and almost all of those are credentials-based theft attacks.

2023-08-08

Only Half Of Citizens Are Happy With Digital Public Services

People are used to the convenience of e-commerce interactions and expect the same service levels in their interactions with government.

2023-06-26

Don't Use ChatGPT At Work

Endangering The Organisation: There are numerous potential hazards for staff & employers connected with using ChatGPT in the workplace.

2023-06-26

Why Are Businesses Ignoring Incident Response?

Not having an Incident Response Plan can be a significant factor in how much impact an attack has and how long it takes to recover. By Phil Robinson

2023-06-22

Progress Software Has Critical Hacking Vulnerabilities

MOVEit: CISA has identified that another software product has been exploited to breach multiple US federal agencies by “unattributed APT actors”.

2023-06-22

What Is The Cybersecurity Maturity Model Certification (CMMC)?

CMMC certification can give your business a competitive edge in the defense contracting marketplace as well as help safeguard national security.

2023-06-21

Data Sovereignty

Cyber security is not just about IT, it is about data governance and the responsibility for that rests firmly with management. By Simon Pamplin

2023-06-19

Is It Possible To Trust AI Decision-Making In Cybersecurity?

AI's Use In Cybersecurity Is Still Evolving: How will this impact decision-making and can the results of its use be trusted? By Iam Waqas

2023-06-15

Analysing XeGroup’s Arsenal Of Cyberattack Methods

Highly Evasive Adaptive Threat Techniques: A new class of cyber threats that evade the usual range of protective tools & analysis. By Brett Raybould

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

WhiteHat Security

WhiteHat Security

WhiteHat’s products enable customers to “Hack Yourself First” so that they gain a greater understanding of the actual risk to their business.

Corero Network Security

Corero Network Security

Corero Network Security is dedicated to improving the security of the Internet through the deployment of its innovative DDoS & Network Security Solutions.

Center for Long-Term Cybersecurity (CLTC)

Center for Long-Term Cybersecurity (CLTC)

The Center for Long-Term Cybersecurity is developing and shaping cybersecurity research and practice based on a long-term vision of the internet and its future.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

RFA

RFA

RFA is a unique IT, financial cloud and managed cyber-security provider to the financial services and alternative investment sectors.

CyberCentric

CyberCentric

Using artificial intelligence, we've streamlined the process of managing your most sensitive data, understanding who has access to it, and ensuring that it is only used in the ways you have specified.

NexGenT

NexGenT

NexGenT have combined military-style training with decades of network engineering and cyber security experience into an immersive program to get people into cyber security fast and effectively.

HighPoint

HighPoint

HighPoint is a leading technology infrastructure solutions provider offering consultancy, solutions and managed services for network infrastructure and cybersecurity.

CWSI

CWSI

CWSI provide a full suite of enterprise mobility, security and productivity solutions to many of Ireland and the UK’s most respected organisations across a wide range of industry and public sectors.

e5 Lab

e5 Lab

e5 Lab seeks to develop solutions to challenges faced by the shipping industry including digital transformation, autonomous technologies and big data in order to promote safe and efficient operations.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

CloudScale365

CloudScale365

CloudScale365 offers state-of-the-art managed IT services and cloud, hosting, security, and business continuity solutions.

IGI Cybersecurity

IGI Cybersecurity

IGI Cybersecurity delivers people-driven cybersecurity for personalized, resilient cyber defense focused on individualized strategy and unshakeable partnership.

Cybersecurity Dubai

Cybersecurity Dubai

Protect your business from cyber-attacks with Cybersecurity Dubai, your partner in online security solutions.

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency (NCSA) - Thailand

National Cyber Security Agency of Thailand is responsible for coordinating and implementing national cybersecurity policies, strategies, and initiatives.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.