FREE TO VIEW


« Back to News

2024-12-21

Cyber Attacks On Ukraine Government Agencies

Russia launches a mass cyber attack on Ukraine’s Justice Department, plus various state registries and government records offices.

2024-12-23

Quantum Computing Nears A Turning Point

From Promise To Reality: As quantum capabilities evolve, organizations must face the urgent need for quantum-safe solutions. By Tim Callan

2024-12-20

Working With Clients? Take a Good Look At Your Cybersecurity Trends

Remote work offers freedom, but not without risks. Stay ahead of cyber threats with these tips to protect your freelance business and clients.

2024-12-23

A Guide to Understanding Market-Leading Data Storage Solutions

Data storage can be a matter of business survival. Cyber resilience, quick recovery & a robust storage strategy are vital. By Billy Conway

2024-12-20

Cyber Risk & Resilience

Survey: Business leaders in the UK still don't seem to understand the significant potential financial losses if cyber risk is not properly addressed.

2024-12-18

General Motors Writes-Off $5bn On Robot Taxis

Autonomous vehicle technology turns out to be a lot harder than anticipated, as GM withdraws from the market, leaving it to Tesla & Waymo.

2024-12-17

The Proliferation Of Open Source Malware

Sonatype reports a 156% increase in open source malware in 2024, estimating that 50% of unprotected repositories contain open source malware.

2024-12-17

The Challenges Of Middle Management In Email Cybersecurity

Implications & Emerging Trends For 2025: Middle managers must be encouraged to take leadership accountability for cybersecurity. By Richard Bourne

2024-12-16

Termite Hacked Blue Yonder 

Termite: A previously unknown ransomware gang has claimed responsibility for an attack on a leading supply chain software company.

2024-12-18

The Corporate CISO Role Is Evolving 

As cybersecurity increasingly becomes a matter of trade-offs, the role of the CISO is transitioning into a more holistic one. By Vishaal Hariprasad

2024-12-17

Diversity Is Key To Combating Gen-AI Hackers

Hiring practices should prioritise candidates with diverse skills & non-traditional backgrounds, broadening the talent pool. By Andrea Cullen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HPE Aruba Networking

HPE Aruba Networking

HPE Aruba Networking, a Hewlett Packard Enterprise company, is a leading provider of next-generation network access solutions for the mobile enterprise.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Callsign

Callsign

Callsign’s mission is to seamlessly power the identification of every web, mobile and physical interaction.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

X-Ways Software Technology

X-Ways Software Technology

X-Ways provide software for computer forensics, electronic discovery, data recovery, low-level data processing, and IT security.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

Truesec

Truesec

TRUESEC has an exceptional mix of IT specialists. We are true experts in cyber security, advanced IT infrastructure and secure development.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Brennan IT

Brennan IT

For over 25 years, Brennan’s expert team has helped businesses achieve real success through innovative and secure technology solutions.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.

SecAI

SecAI

SecAI is an innovative threat intelligence-driven, and AI-powered vendor aiming at cyber threat detection and response.

CyFox

CyFox

CYFOX is at the forefront of cybersecurity innovation, specializing in providing cutting-edge AI-driven solutions tailored for any businesses.