FREE TO VIEW


« Back to News

2022-05-17

The Big Cyber Security Threats That You Can Prepare For

No organisation is safe online. There are a wide range of risks and the best defence is awareness of the major types of threat and proper training.

2022-05-17

An Assessment: Pre-Invasion Attacks On Ukraine

More evidence is emerging about the extent and timing of a string of cyber attacks launched on Ukraine just before the invasion began.

2022-05-14

Bitcoin Tanks

Widely used to facilitate cyber crime, frustrate law enforcement, evade regulation and guzzle energy, it turns out Bitcoin is also a lousy investment.

2022-05-16

Investment Scams Are Increasing

Britain's financial regulator is warning people to beware of fake financial advisers offering investment schemes via online meeting platforms.

2022-05-16

Threat Hunting Solutions

It's crucial for organizations to utilize proactive cyber threat hunting in building, securing and maintaining their security infrastructure.

2022-05-16

Costa Rica Declares A State Of Emergency Following Cyber Attacks

The Conti cyber crime group are holding the government of Costa Rica to ransom in a wide -ranging attack that has knocked state agencies offline.

2022-05-13

Wanted: Access To Social Media Data

Despite its enormous influence and large scale manipulation by malicious actors, Social Media remains opaque and resistant to detailed analysis.

2022-05-13

Some Apps Come Loaded With Malware

App stores share a common threat profile. Apps loaded with malware present the most immediate risk to millions of unsuspecting users.

2022-05-10

The Cyber Security Investment Boom Continues

M&A activity grew to over $70 billion in 2021and reached almost $27 billion by the end Q1 2022, but there are signs investors are getting cautious.

2022-05-10

Special Measures To Deal With Quantum Technology

The US wants to speed up the domestic development of quantum technology, whilst adddressing the risks it presents to secure communications.

2022-05-09

Anonymous Launch An Attack On Rosneft

The hacking collective Anonymous claim they have stolen 20 Terabytes of data from a major Russian oil company, knocking its systems offline.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

Eco Recycling (Ecoreco)

Eco Recycling (Ecoreco)

Eco Recycling is India's first and leading professional E-waste Management Company that has set industry benchmarks with its innovative & environment friendly disposal practices.

Lumu Technologies

Lumu Technologies

Lumu is a cybersecurity company that illuminates threats and attacks affecting enterprises worldwide.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

SAFECode

SAFECode

SAFECode is a global industry forum where business leaders and technical experts come together to exchange insights on creating, improving, and promoting effective software security programs.

Clear Thinking Solutions

Clear Thinking Solutions

Clear Thinking is an IT Solutions company specialising in secure & compliant technical services.

C3.ai Digital Transformation Institute

C3.ai Digital Transformation Institute

The C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

Trenton Systems

Trenton Systems

Trenton Systems are committed to providing high-performance computing solutions to customers running mission-critical applications in harsh settings worldwide and across various industries.

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji)

HLB Mann Judd (Fiji) (formerly known as HLB Crosbie & Associates) is a well-established firm of accountants and business advisers in Fiji.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

WBM Technologies

WBM Technologies

WBM Technologies is a Western Canadian leader in the provision of outcomes-driven information technology solutions.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.

Ryan Financial Lines

Ryan Financial Lines

Ryan Financial Lines Cyber provides risk transfer solutions for complex cyber and technology exposures, globally.