News

2021-05-10

Covid-19 Has Launched A Pandemic Of Cyber Crime

Despite increased vulnerability to data breaches during lockdown, only 35% of UK businesses have deployed proper security monitoring tools.

2021-05-11

Critical Pipeline Network Shut Down By Hackers

UPDATE: A pipeline which supplies 45 percent of the US East coast fuel supply has been shut down by hackers following a ransom attack.

2021-05-07

Apple Hammered By EU

Apple is charged with breaking EU competition rules over the way it runs its App Store, but they are making plenty of money to pay the fine.

2021-05-06

Key Trends In Cyber Security

Along with the change in many people's work environment in 2020, there are several rising trends companies need to be aware of in 2021.

2021-05-06

Securing Smart Devices

Data centers may be safe from outside intrusion, but IoT devices are often at risk of being exploited by those looking for an easier way into systems.

2021-05-06

Why You Should Never Use A Free Proxy

Beware Of The Honeypot: A lot of malicious activity on the internet comes from public proxies and you should only use trustworthy providers.

2021-05-06

Top Five Most Common Gaps In Businesses’ Cyber Security

Embedding cyber security into your operations takes everyone in the organisation to understand and accept their responsibility. By Victor Lough

2021-05-05

Your Organisation Needs A Cyber Audit

Cyber threats evolve at breakneck speed and it’s important to continually ensure that your cyber security measures are effective and up to date.

2021-05-05

The Cyber Security Paradigm Is Changing

Traditional cyber security, with hard external boundaries, is being undermined by pressure for more operational flexibility and developments in IT.

2021-05-04

Managing Cyber Security As Office Work Resumes

Cyber security and compliance teams must begin the return-to-office planning process so that when employees arrive, everyone is prepared.

2021-05-04

Dark Web Drug Dealers Jailed

Two drug dealers who made $4.8 million from their dark web drugs operation got so many clients that they used an automated “bot” to run the business.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Glasswall Solutions

Glasswall Solutions

Glasswall Solutions has developed a disruptive, innovative security technology which provides unique protection against document based cyber threats.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

SecuDrive

SecuDrive

SecuDrive, provides hardware encrypted external storage devices to protect a company’s sensitive and important data.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Prolimax

Prolimax

Prolimax deliver innovative solutions to IT Manufacturers, Distributors, Resellers and End-users including Data Erasure and secure IT Asset Disposition (ITAD)

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Assure IT

Assure IT

Assure IT is a Singapore company specialising in technology governance, risk and compliance.

Liminal

Liminal

Liminal is a boutique strategy advisory firm serving digital identity, fintech, and cybersecurity clients, and the private equity / venture capital community.