FREE TO VIEW


« Back to News

2023-02-13

New Russian Malware Targets Ukraine 

Graphiron: The crisis between Ukraine, NATO & Russia includes aggressive rhetoric, nuclear threats, critical infrastructure sabotage & cyber attacks.

2023-02-10

Specialist Marine Cyber Insurance For Ports & Vessels

Shipping Vulnerable To Cyber Attack: A new partnership to deal with the ever more demanding cyber insurance needs of the maritime sector.

2023-02-21

Insider Threat Management: Keep Up With Growing Threats

Proper insider threat management is essential for reducing the chance of data theft, but nurturing a healthy corporate environment is important too.

2023-02-08

Creating Order Out Of WAF Management Chaos

Web Application Firewall Management: How WAF rules are run & processed can provide security without sacrificing performance. By Paul McNamara

2023-02-08

SMBs Are Taking Cybersecurity More Seriously

A new report finds that Small & Medium Businesses are actively investing in cyber protection - but there is room for improvement. By Chris Mckie

2023-02-07

Human Error Is A Hacker's Dream

Human Behaviour Is A Vital Piece Of The Puzzle: Phishing, Vishing and MFA Fatigue all have a common characteristic. By Andrew Parsons

2023-02-11

Hackers Hit Thousands of Computers

Ransomware Targeting VMware ESXi Servers: Organisations are warned to take urgent action to protect their unpatched systems.

2023-02-07

Linux Malware Rates Reach Record Highs

Cyber Attack Trends: Until recently, cyber criminals largely ignored Linux compared to other more popular operating systems - not any more.

2023-02-08

Cyber Crime Is The World’s Third Largest Economy

Damage Totaling $8 Trillion Worldwide In 2023: If cybercrime were measured as a country it would be the 3rd largest economy.

2023-02-10

Google Shuts Down Misinformation

Dragonbridge: Google's threat analysis group has terminated thousands of Chinese-linked accounts spreading disinformation across social media.

2023-02-02

FBI Infiltrates Ransomware Group

The FBI infiltrated the notorious Hive ransomware group over seven months to block its attempts to extort funds from over a thousand victims.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

Upfort

Upfort

Upfort (formerly Paladin Cyber) unifies award-winning security and robust cyber insurance to deliver comprehensive cyber risk solutions.

Knovos

Knovos

Knovos is a leading technology innovator developing solutions for automating, integrating, and innovating Information Governance.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Beyond Encryption

Beyond Encryption

Mailock by Beyond Encryption is a secure email solution that allows businesses to exchange email securely, safe in the knowledge that their email can only be read by their intended recipient.

BriskInfosec Technology & Consulting

BriskInfosec Technology & Consulting

BriskInfosec provides information security services, products and compliance solutions to our customers.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

DigitalPlatforms

DigitalPlatforms

DigitalPlatforms SpA is an Italian group with the mission of providing end-to-end solutions and Internet of Things and Cyber technologies to companies that manage critical infrastructures.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.