News

2024-01-08

Abduction & Extortion Goes Online

Cyber Kidnapping: Criminals coerce a victim to stage their own kidnapping and film it, providing blackmail material against their own families.

2024-01-09

British Library Pays A High Price To Recover From A Cyber Attack

The British Library refused to pay a £600,000 ransom demand and will now have to spend £6,000,000 to rebuild its damaged records & systems.

2024-01-08

Stronger Civilian Cyber Defences In Ukraine

Ukraine's allies commit to building stronger civilian cyber security capacity to help Ukraine's self-defence and longer-term cyber resilience.

2024-01-09

A Crucial Ally In The War Against Digital Deception

Fraud Detection Software: A dynamic, system, adapting to identify & combat the many forms of fraud threatening the digital landscape.

2024-01-08

Airbus To Pay €1.8bn To Buy Atos Cyber Security Unit

The strategic importance of the cyber security industry is demonstrated by the interest from major aerospace companies in getting involved.

2024-01-08

Winning The Battle Against Ransomware

Context-Sensitive Defence: Even the best cyber security systems can fail and its vital that sensitive data has multiple layers of defence.

2024-01-05

23andMe Blames The Victims

In response to multiple legal actions, the genomics research firm is telling customers it was really their fault that their data was breached.

2024-01-04

EU Updates Its Cyber Solidarity Act

A Cyber Shield For Member States: Increased cooperation between member states will improve their security management in response to attacks.

2024-01-04

The Pivotal Role Of Access Control In Cyber Security

As essential as locks and keys are in the physical world, establishing effective control over who can enter your digital space is vital.

2024-01-05

AI, Security Culture & Rising Threats

Cybersecurity Predictions For 2024: With criminals rapidly adopting Artificial Intelligence tools, CISOs must raise their game. By Tom Gorup.

2024-01-03

Bridging The Cybersecurity Skills Gap With Efficiency

How Cloud SIEM Platforms Can Maximize SOC Scalability: Innovative cloud-based solutions can help navigate the skills shortage. By Kev Eley

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Octiga

Octiga

Octiga is an office 365 cloud security provider. It offers Office 365 monitoring, incident response and recovery tools.

PreCog Security

PreCog Security

PreCog Security is a US based cybersecurity risk mitigation company. We specialize in helping you find, minimize and manage vulnerability risk within your product, network and process.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

JFrog

JFrog

JFrog is on a mission to enable continuous updates through Liquid Software, empowering developers to code high-quality applications that securely flow to end-users with zero downtime.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

Acrisure

Acrisure

Acrisure is powered by the best of human and high-tech and offers insurance, reinsurance, real estate, cyber and more solutions to millions of clients around the world.

AgilePQ

AgilePQ

AgilePQ visibly secures IoT devices worldwide to protect the privacy, safety, and well-being of all people.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.

Lyvoc

Lyvoc

Lyvoc is a premier cybersecurity integration partner renowned for its expertise in supporting its clients to accelerate and secure their digital transformation.