FREE TO VIEW


« Back to News

2022-08-30

It's Just Good Business To Collaborate With A Web Data Collection Partner You Can Trust

Web data enables security operators to identify and prevent real-time threats and vulnerabilities through better visibility & detection proficiency.

2022-08-29

Attackers Demand $10m Ransom From French Hospital

Clinicians have to access data and write prescriptions by hand following a major disruption, but the hospital’s director says it will not pay.

2022-08-29

Twitter Concealed Known Security Flaws

Whistleblower: Twitter has major security problems that pose a threat to its users, to its company shareholders, to US national security & democracy.

2022-08-29

Detect Spoofing Before Your Organisation Suffers Fraud

Business Email Compromise fraud is where cyber criminals impersonate senior managers and end users should be very cautious before paying invoices.

2022-08-29

Montenegro Falls Under Attack

Montenegro is the latest NATO member state to accuse Russia of carrying out a large scale attack on government infrastructure & online services.

2022-08-29

Insurers Will Exclude Some Nation-State Cyber Attacks From Cover

Lloyd's of London will cease offering insurance cover against certain types of nation-state cyber attacks and wars from March 2023.

2022-08-26

Bluetooth Standards Are Reshaping Medical Devices

The Internet of Medical Threats: Bluetooth vulnerabilities in a new generation of medical devices can jeopardise patient safety. By Scott Register

2022-08-26

EU Still Blocking Social Media Users' Data Transfer

Meta is still threatening to shut down Facebook and Instagram in Europe if it can’t continue to transfer and store user data in the US.

2022-08-25

Think Carefully Before You Pay For Cloud Downtime Insurance

Considering Buying Cloud Downtime Insurance? Before you buy, take these three vital steps to ensure business continuity. By Florian Malecki

2022-08-24

Microsoft Disrupts Russian Spies

Microsoft Disrupt Seaborgium: A highly persistent Russian threat actor, frequently targeting the same organisations for extended periods.

2022-08-23

Xiaomi Phone Bug Enables Theft

A flaw in smartphone maker Xiaomi's operating software could lead to mobile transactions being disabled, replicated and forged.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

CipherMail

CipherMail

CipherMail provides email security products which allow organizations world wide to automatically protect their email against unauthorized access both in transit and at rest.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Zerodium

Zerodium

Zerodium is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Ministry of Information and Communications (MIC) - Vietnam

Ministry of Information and Communications (MIC) - Vietnam

The Ministry of Information & Communications of Vietnam is the policy making and regulatory body in the field of information technology and national information and and communication infrastructure.

GitProtect.io

GitProtect.io

​GitProtect is a fully manageable, professional GitHub and Bitbucket backup and recovery software that protects repositories and metadata from any event of failure.

MAXXeGUARD Data Safety

MAXXeGUARD Data Safety

MAXXeGUARD: The High Security Shredder. MAXXeGUARD easily destroys hard disks up to the highest security levels as well as other digital data carriers like SSD’s, LTO’s, USB’s, CD’s etc.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Sonet.io

Sonet.io

Sonet.io is built for IT leaders that want a great experience for their remote workers, while enhancing security and observability.

Cyber News Live (CNL)

Cyber News Live (CNL)

Cyber News Live provide vital information and raise awareness about all things 'cyber' to ensure you stay protected in the digital world.

Gogolook

Gogolook

Gogolook is a leading TrustTech company. With "Build for Trust" as its core value, it aims to create an AI- and data-driven global anti-fraud network as well as Risk Management as a Service.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.