FREE TO VIEW


« Back to News

2024-08-22

How Can You Scan Your Mac For Existing Malware?

Macs have a great reputation, but users need to take steps to identify potentially dangerous malware that might steal their identity & delete files.

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

2024-08-20

Quantum Computing Security Could Solve The Data Sovereignty Challenge

What can organisations do to ensure their data processing remains on the right side of the law when managing data sovereignty? By Adrian Fern

2024-08-17

A New Microsoft Vulnerability Warning

Just a month after the Crowdstrike incident, another vulnerability has been found in Windows that can result in the 'Blue Screen of Death' error.

2024-08-19

Five Critical Security Benefits Of CIAM

Customer Identity & Access Management: A system to manage the identity & access requirements of customers interacting with digital services.

2024-08-16

Revolutionizing Legal Research & Document Analysis With RAG Technology

Retrieval-Augmented Generation: An AI-driven technology is reshaping the legal industry by enhancing efficiency, accuracy, & depth of legal work.

2024-08-19

Cyber Insurance: The Cost Of Doing Business

Ransom Attacks & Extortion Demands Are Soaring: The question for any company is what would you pay and what does it cost to defend yourself?

2024-08-19

Resilience As Regulation: Preparing For The Impact Of CER

EU Critical Entities Resilience Directive: Along with NIS2, the CER will change the way organisations think about security. By Andrea Monteleone

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Infrascale

Infrascale

Infrascale specialise in providing cloud backup and disaster recovery services.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

STM

STM

STM provides system engineering, technical support, project management, technology transfer and logistics support services for the Turkish Armed Forces.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

RiverSafe

RiverSafe

RiverSafe is a professional services provider specialising in Cyber Security, Data Operations and DevOps, putting security at the heart of everything we do.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.