FREE TO VIEW


« Back to News

2023-01-25

Five Application Security Predictions For 2023

The shift to cloud native applications is a driver of significant opportunities and challenges in the area of cybersecurity. By Dean Agron

2023-01-24

Ukraine Signs Cyber Security Deal With NATO

The cyber security collaboration gives Ukraine access to NATO’s malware information sharing platform, along with 'enhanced cyber cooperation'.

2023-01-24

Cloud-Based Security Solutions Are On The Up

There are significant financial & functional advantages which are driving investment in cloud-based security solutions in 2023. By Vivek Daga

2023-01-23

British School Childrens' Confidential Data Dumped

A hacking gang focused on schools & colleges has leaked confidential data about children on the Dark Web after failing to extract any ransom.

2023-01-23

War In Ukraine Drives A Decline In Stolen Cards

Russia's failing invasion of Ukraine led to a 62% decrease in stolen payment card records, attributed to a crackdown on domestic cyber criminals.

2023-01-23

The Back Door Threat To Cybersecurity

Advanced Persistent Threats (APTs) pose a unique challenge with motives, techniques, and tactics that differ from traditional cyberattacks.

2023-01-21

How Next Gen SIEM Addresses The Risks Of Disjointed Security Tools

Multi-vendor Enterprise Software Challenges: With next gen SIEM, unifying disjointed security tools and data sources is more easily achievable.

2023-01-21

T-Mobile Hacker Exposes 37m Customers' Personal Data

Unfortunately Not Immune: T-Mobile has disclosed seven major breaches since 2018 and the latest event may be one of the biggest of all time.

2023-01-22

The Advantages Of Using A VPN 

VPNs are not the silver bullet to make you invincible on the Internet, but they’re a helpful addition to security & privacy. By Milos Djordjevic

2023-01-20

Sexual Abuse & Harassment Of Women

Sexual harassment is rife in the cyber security industry, with women reporting being groped at events and receiving inappropriate content online. 

2023-01-20

Perfectly Coded APIs Can Be Susceptible To Attack

A False Sense Of Security: Even if an API is perfectly coded, inventoried & tested, it can still be probed and compromised. By Andy Mills

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Checkmarx

Checkmarx

Checkmarx provides state-of-the-art application security solutions with static code analysis software.

Council of Europe - Cybercrime Programme Office (C-PROC)

Council of Europe - Cybercrime Programme Office (C-PROC)

The Cybercrime Programme Office of the Council of Europe is responsible for assisting countries worldwide in strengthening their legal systems capacity to respond to cybercrime

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

VNCERT

VNCERT

VNCERT is the national Computer Emergency Response Team for Vietnam.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Informatics International

Informatics International

Informatics is a leading ICT provider in Sri Lanka, providing cutting-edge software & infrastructure solutions and services including cyber security.

Antares NetlogiX

Antares NetlogiX

Antares Netlogix are a leading Austrian service provider for IT security, critical infrastructures and managed security services.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Information Services Group (ISG)

Information Services Group (ISG)

As a leading global research and advisory firm, ISG partners with our clients to determine a future vision, lead rapid change and realize the value of your digital investments at scale.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Armolon

Armolon

Armolon provides comprehensive data breach and cybersecurity, as well cybersecurity audits and certifications, and disaster recovery/business continuity services to clients.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

CIP Cyber

CIP Cyber

CIP Cyber is an online learning community with a mission of connecting, training, and certifying cybersecurity professionals to protect critical infrastructure.