FREE TO VIEW


« Back to News

2023-01-20

Europol Arrest Crypto Currency Fraud Gang

The fraud worked using advertisements posted on social media to lure victims to fake investment websites operated by cyber criminals.

2023-01-19

Cyber Security Issues For The Mobile Industry

Expert Comment: Business leaders from across the Mobile industry share their predictions for cyber security issues in 2023. By Dario Betti

2023-01-19

Building An Identity-First Security Strategy

Going Beyond The NIS2 Directive: Effectively protecting identities, both human and machine, is a top priority for enterprises. By Tim Callan

2023-01-18

For Sale: Data Stolen From Volvo 

The stolen data includes internal documents related to telematics, special police vehicles, project management dashboards and car part schematics.

2023-01-18

NHS Is The Most Phished Government Organisation

The British National Health Service is the highest on the list of UK government organisations most frequently impersonated in email scams.

2023-01-17

Cyber Attack On Lisbon Port 

LockBit have claimed responsibility for the attack, saying its ransomware has taken down the port’s website and internal computer systems.

2023-01-17

NATO - AI Cyber Attacks Are A Critical Threat

NATO Cyber Range: Commanders from over 30 countries put their skills to the test on how they would defend their country in a simulated attack.

2023-01-17

Three Steps To Protect Your Organisation From Wiper Malware

How to Avoid A Wipeout: No matter what cybercriminals may do, a robust backup and recovery plan will keep your data secure. By Florian Malecki

2023-01-16

The Internet of Vehicles - Connected Cars

IoV: Some day soon, every car will become connected, with warning sensors, road hazard detections, and vehicle-to-pedestrian communication.

2023-01-14

The Application Of Artificial Intelligence In Cybersecurity

AI based cybersecurity technologies have evolved to assist information security teams in reducing breach risk & improving resilience. By Mike Sandru

2023-01-14

2023 - Cyber Threats To US Infrastructure 

Malware attacks on healthcare & other critical infrastructure, plus the escalating costs of ransomware are focusing minds in the US government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber adAPT

Cyber adAPT

Cyber adAPT offers a leading network threat detection platform (NTD) to the enterprise and ODM/OEM markets.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

SentryBay

SentryBay

SentryBay is a real-time data security company developing technology for PC, mobile, the cloud and IoT.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Intelligent Waves

Intelligent Waves

Intelligent Waves holds and manages contracts to provide an array of intelligence, operational, communications and IT support to the USG in austere, forward-deployed, hazardous duty environments.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Cygenta

Cygenta

Cygenta brings a new approach to cybersecurity. We understand that true security means having digital, human and physical security working in harmony.

CoursesOnline

CoursesOnline

CoursesOnline.co.uk is a database listing IT security courses from providers across the UK.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.