FREE TO VIEW


« Back to News

2022-08-03

New British Cyber Advisor Scheme

The NCSC is launching a Cyber Advisory Service to extend a trusted source of cyber security advice to a wider range of organisations. 

2022-08-03

How to Prepare Your Security Team For The Future Of Vulnerability Management

Vulnerabilities Are Not Equal: Security teams should use a risk-based vulnerability prioritization, automated tools & effective controls. By Lisa Xu

2022-08-03

Publicly Reported Ransomware Incidents Are Just The Tip Of An Iceberg

ENISA 2022 Threat Landscape Report: Ransomware is one of the most devastating types of cyber attacks, yet is going widely unreported.

2022-08-03

Flunking Cyber Education

Layer Cake: Decision makers, middle managers and the IT experts who actually do the job need to communicate much better. By Ronald Marks.

2022-08-02

Google Chrome Extension Used To Steal Emails

SHARPEXT: A N. Korean threat group is using a malicious browser extension to steal emails from Google Chrome users while they read their webmail.

2022-08-02

Mercenary Hacking Group Selling Spyware

Subzero Spyware: Microsoft have discovered a powerful exploit being used to hack law firms, banks and strategic consultancies around the world.

2022-08-02

For Sale: 5.4m Twitter Users’ Data

Devil In The Detail: The information for sale allegedly comprises phone numbers & email addresses, including celebrities and numerous companies.

2022-08-01

Over One Hundred Arrests In Business Email Compromise Swoop

Members of the criminal group included computer experts, who created the phishing domains and carried out a sophisticated email fraud.

2022-08-01

Why A Managed Security Service Provider Should Be On Your Cyber Roadmap

Organisations need resilient cyber security strategies to protect against complex threats and Managed Services could be the answer. By Francis O’Haire

2022-08-01

How IAST Improves Application Security & Six Steps to Effective Deployment

Interactive Application Security Testing provides a quick and effective solution to vulnerability detection. Here are the most common applications.

2022-07-28

Is Your Anti-Virus Doing Its Job?

Anti-Virus Alone Is Not Good Enough: Organisations need to take a broad approach to stop bad code entering their network. By Colin Tankard

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

DataLocker

DataLocker

DataLocker offers both hardware based external storage and software based cloud storage encryption solutions.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

Ukrainian Academy of Cyber Security (UACS)

Ukrainian Academy of Cyber Security (UACS)

UACS is a professional non-profit public organization established to promote the development of an extensive network and ecosystem of education and training in the field of cyber security.

RapidScale

RapidScale

RapidScale’s managed cloud solutions provide reliable, innovative, and secure services, all complete with white-glove service and full management options.

SECFORCE

SECFORCE

SECFORCE is a leading information security consultancy specialising in bespoke penetration testing and red team engagements.

Madrona Venture Group

Madrona Venture Group

Madrona Venture Group invests in seed and early-stage technology companies in areas including cybersecurity.

FPT Software

FPT Software

As a leading technology service provider, FPT assists customers of all sizes and from any industries in implementing and adapting digital technologies including cybersecurity.

CyberScotland

CyberScotland

The CyberScotland Partnership is a collaboration of key strategic stakeholders, brought together to focus efforts on improving cyber resilience across Scotland in a coordinated and coherent way.

Trace3

Trace3

Trace3 is a pioneer in business transformation solutions, empowering organizations to keep pace with the rapid changes in IT innovations and maximize organizational health.

Accenture

Accenture

Accenture is a leading global professional services company providing a range of strategy, consulting, digital, technology & operations services and solutions including cybersecurity.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.