FREE TO VIEW


« Back to News

2022-03-01

Increasing Use Of Encryption For Malicious Purposes

Older Servers Are More Vulnerable: Attackers have dicovered the correlation between poor HTTPS configurations and a vulnerable web server.

2022-02-25

New Tools To Simulate Electronic Warfare

Swarming Munition: The US Air Force is testing autonomous software to simulate electronic warfare in complex, multiple target settings.

2022-02-22

The EU Mobilises Its Cyber Rapid Response Team To Deal With Russian Attacks

Ukraine is at the front line in global cyber conflict and a testbed for intelligence services to deploy their offensive cyber and espionage tools.

2022-02-21

The New Security Demands Of Our Hybrid Working Future 

Remote user access has become the new normal, but the rapid transition means some businesses are not adequately prepared. By Ian Porteous

2022-02-21

Facebook To Pay $90m Penalty For Tracking Users

Facebook accused of breaking US laws by using plug-ins to store cookies that tracked users visiting websites containing Facebook “like” buttons.

2022-02-17

Ukraine Defence Ministry & Banks Under Cyber Attack

The Ukraine Stratcom Centre says that 'false flag' attacks on its Defence Ministry and two banking websites are intended to spread alarm & confusion.

2022-02-16

Cyber Security Regulations For Smart Devices

Smartphones, TVs, Speakers & Routers: The British government has introduced new legislation to better protect consumers' IoT devices.

2022-02-16

Qbot Malware Can Read Your Email

Despite its age, Qbot malware has been continually developed and continues to be a dangerous and persistent threat to organisations.

2022-02-15

Russian Cyber Attacks On Ukraine Increase

Cyber attacks will form part of a broad campaign if Russia invades Ukraine, with malware and online disinformation among the weapons deployed.

2022-02-15

Making Security Seamless - The Common Identity Platform

By establishing a Common Identity Platform, it is perfectly possible to achieve a seamless identity management service. By Jacob Ideskog

2022-02-17

IT Technician Jailed For Revenge Attack After Being Fired

A British IT technician has been jailed for a revenge cyber attack on a school after being sacked for not disclosing a record of criminality.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Eden Legal

Eden Legal

Eden Legal provides legal services on commercial and regulatory issues affecting digital businesses.

Snort

Snort

Snort is an open source intrusion prevention system capable of real-time traffic analysis and packet logging.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

BPC Banking Technologies

BPC Banking Technologies

BPC’s advanced fraud prevention solution helps card issuers and acquirers combat the growing threat by monitoring 100% of transactions, online, in real-time across all channels.

DomainTools

DomainTools

DomainTools is the global leader for internet intelligence and the first place security practitioners go when they need to know.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

Rostelecom Solar

Rostelecom Solar

Rostelecom-Solar is a Cyber Security Company, providing software and managed detection and response (MDR) services to protect critical information from advanced cyber threats.

West Midlands Cyber Resilience Centre (WMCRC)

West Midlands Cyber Resilience Centre (WMCRC)

The East Midlands Cyber Resilience Centre supports and helps protect SMEs and supply chain businesses and third sector organisations in the region against cyber crime.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

ADNET Technologies

ADNET Technologies

ADNET Technologies is a SOC 2, Type II Compliant IT management and cybersecurity firm.

AccessIT Group

AccessIT Group

AccessIT Group is a specialized cybersecurity solutions provider offering a full range of advanced security services.

Security4Media

Security4Media

Security4Media is a non-profit association set up to reduce risks and support trust in media, in the face of increasing cybersecurity threat levels.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.