FREE TO VIEW


« Back to News

2021-09-07

Apple Delays Scanning iPhones For Child Abuse

Plans for software capable of detecting child abuse images to be built into iPhones and iOS devices have been suspended over privacy concerns.

2021-09-07

Russian Trolls Target News Websites

A major operation to influence public opinion which saw fake comments posted on Western media in support of Russian interests is confirmed.

2021-09-07

Zero Trust - The New Standard Of Security

Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks. By Charles Griffiths

2021-10-05

Securing Hybrid Workplaces From Attack

If organisations are going to use hybrid work models successfully over the long term, then they will need to further invest in their security strategy. 

2021-09-06

Russia’s Strategy For Information Warfare

Information Warfare: Its not just about hacking devices, shutting down pipelines and stealing data. Russian strategy is more subtle and stealthy.

2021-09-03

The Cyber Security Market Is Booming

The global cyber security market size was valued at $167 billion in 2020 and is expected to grow 11% year on year for at least the next five years.

2021-09-01

Malware Attacks Target Linux-based Operating Systems

Linux operating systems are being targeted, with nearly 13m detections in 2021 H1, mostly in outdated systems running unpatched software.

2021-09-01

AWS Marketplace presents: How to integrate security into the DevOps pipeline

Thursday, September 16th | Join this webinar to learn how you can empower your developers with integrated DevOps pipeline security in AWS.

2021-08-31

Social Media Tries To Protect Afghan Users

Facebook, Twitter and LinkedIn have moved to secure the accounts of users worried for their safety under the Taliban regime in Afghanistan.

2021-08-31

China Has A 3-Year Plan For Cyber Security

China is increasing efforts to protect national cyber security and will strengthen IT infrastructure & resilience with new security regulations.

2021-08-30

Hackers Steal $100m From Japanese Cryptocurrency Exchange

Liquid Assets: Around $97m in Bitcoin and Ethereum tokens have been spirited away from a 'warm wallet' operated by a leading exchange.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Security Innovation

Security Innovation

Security Innovation is a leader in software security assessments and application security training to top organizations worldwide.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

Randori

Randori

Randori is an attack platform that provides "red-teaming" as a service - basically, staging simulated hack attacks to test for vulnerabilities and gaps in the security response.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

CyberSat Summit

CyberSat Summit

CyberSat is dedicated to fostering the necessary discussions to flesh out and develop solutions to cyber threats in the satellite industry.

DeepFactor

DeepFactor

DeepFactor is the industry’s first Continuous Observability platform enabling Engineering and AppSec teams to find and triage RUNTIME security, privacy, and compliance risks in your applications.

TPx Communications

TPx Communications

TPx is a leading managed services provider offering a full suite of managed IT, unified communications, network connectivity and security services.

Retruster

Retruster

Protect your users against phishing emails, ransomware & fraud with the most advanced, user-friendly, non-intrusive solution available.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.