FREE TO VIEW


« Back to News

2022-01-18

Employee Cyber Security Training Is Vital To Reduce Cyber Attacks

Online cyber awareness training for employees can mitigate the risk of cyber attacks on your business without disrupting the workday.

2022-01-19

WhisperGate: Russia Responsible For Cyber Attacks On Ukraine

Update: Russia is responsible for malware attacks, defacing websites & leaving numerous infected Ukraine Government computers wiped.

2022-01-17

'War Is Coming’ - TikTok Used To Scare Swedish Children

Swedish youngsters who are heavy TikTok users are being frightened by a mysterious disinformation campaign threatening an impending war.

2022-01-17

Google Buys Siemplify For $500m

A Watershed Moment: Google has acquired Israeli threat detection firm Siemplify and wants to ‘change the rules’ of threat detection and response.

2022-01-17

REvil Cyber Ransomware Gang Members Arrested

REvil Has Ceased To Exist: Russian law enforcement has dismantled the notorious ransomware group and made over a dozen arrests.

2022-01-15

Process Sensor Cyber Security Is A Vital Issue

The gap in process sensor cyber security and process safety is a critical vulnerability in many industries, calling for expert scrutiny. By Joe Weiss

2022-01-14

North Korean Hackers Stole $400m In Crypto Currency

North Korean cyber criminals have had a record year in 2021, launching attacks on crypto currency platforms, investment firms & centralised exchanges.

2022-01-14

Ukraine Government Hit By Massive Cyber Attacks

"Be Afraid And Expect The Worst": Ukrainian government websites hijacked & plastered with threatening messages as Russian hackers get busy.

2022-01-12

SIM Swapping Attacks Caused T-Mobile Breach

T-Mobile Incident Report: SIM swapping makes it possible for attackers to take control of a target's mobile phone number.

2022-01-12

Azure Active Directory Recycle Bin Won’t Save Your Critical Data

Failing to monitor activity across all Active Directory environments without an effective backup strategy can lead to disaster.  By Greg Jones

2022-01-11

African Nations Join UN Cyber Crime Initiative

In 2050, one in four of the world’s people will come from sub-Saharan Africa - their current digital challenges need to be addressed. By Karen Allen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Red Hat

Red Hat

Red Hat is a leader in open source software development. Our software security team proactively identifies weaknesses before they become problems.

ISACA Conferences

ISACA Conferences

ISACA is dedicated to offering the most dynamic and inclusive conferences to keep you abreast of the latest advances in IT and Information Security.

Antiy Labs

Antiy Labs

Antiy Labs is a vender of antivirus engine and solution, providing the best-in-breed antivirus engine and next generation antivirus services for confronting PC malware and mobile malware.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Idaptive

Idaptive

Idaptive delivers Next-Gen Access through a zero trust approach. Idaptive secures access everywhere with single sign-on, adaptive MFA, EMM and analytics.

e.Kraal Innovation Hub

e.Kraal Innovation Hub

e.Kraal is a Cybersecurity Innovation Hub whose mission is to secure the future of Cybersecurity in Kenya by accelerating innovation and creativity in the cyberspace ecosystem.

Greylock Partners

Greylock Partners

Greylock Partners is a leading venture capital firm based in Silicon Valley. We invest in all sectors of enterprise software technology including applications, cloud/SaaS, networking and security.

Converge Technology Solutions

Converge Technology Solutions

Converge Technology Solutions Corp. is a North American IT solution provider delivering advanced analytics, cloud, cybersecurity, and managed services solutions.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

3Lines Venture Capital

3Lines Venture Capital

3Lines Venture Capital invests in exceptional founders and startups working on broad disruptive themes of Future of Work, AI enabled enterprises, and Industry 4.0.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Aura

Aura

Aura is a mission driven technology company dedicated to creating a safer internet for everyone. We’re making comprehensive digital security that's simple to understand and easy to use.

Winbond Electronics

Winbond Electronics

Winbond is a Specialty memory IC company. Product lines include Code Storage Flash Memory, TrustME® Secure Flash, Specialty DRAM and Mobile DRAM.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security