FREE TO VIEW


« Back to News

2021-08-05

Home Working Creates More Cyber Attacks

As organisations prepare for a post-Covid world, one of the many issues they will have to address is much better IT security for home workers.

2021-08-04

New Tools Optimise Use Of Existing Data

Advances in cloud-based analytic tools are providing cost-effective operational improvements to ageing IT systems across many sectors.

2021-08-04

2021 Global Cyber Security Event

(ISC)² the world’s largest association of certified cybersecurity professionals releases the agenda for its annual Security Congress in October.

2021-08-02

Saudi Aramco Faces $50m Ransom Demand

Aramco has lost 1 TB of company data and the hackers are demanding a $50 million ransom in cryptocurrency to restore the files.

2021-07-30

Twitter Celebrity Hack Suspect Arrested

Hackers took control of public figures' accounts to send a series of tweets asking followers to transfer crypto currency to a specific Bitcoin wallet.

2021-07-28

Ransomware Often Begins With Phishing

Phishing is the delivery mechanism of choice for ransomware and these are critical problems every organisation must address in order to keep secure.

2021-07-27

Was There A Russian Plot To Put Trump In The White House?

An unprecedented leaked document from Moscow suggests that Vladimir Putin launched a secret multi-agency effort to get Trump elected in 2016.

2021-07-28

Biden Goes After Chinese & Russian Cyber Attackers

After confronting Vladimir Putin on cyber security, President Biden is now turning on China for sponsoring cyber criminal activity around the world.

2021-07-28

Royal Cyber Security Significantly Increased

Queen Elizabeth has appointed a CISO to increase the royal family's cyber security as the risk of unauthorised access to their data grows.

2021-07-27

Power Generation Systems Need Blockchain Security

The increasingly complex interaction among different power systems calls for a secure, efficient and robust cyber infrastructure using blockchain.

2021-07-27

Data Privacy Is Key To The Technology Battle With China

The US wants to establish international privacy-protection standards to counter the proliferation of powerful new technologies dominated by China.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP)

Swedish Incubators & Science Parks (SISP) is the Swedish industry association for Swedish incubators and science parks.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Synamic Technologies

Synamic Technologies

Synamic Technologies was founded in 2018 as a start-up to automate cyber security processes. Our CISOSCOPE product automates vulnerability management, risk management and compliance.

Cyberwatch Finland

Cyberwatch Finland

Cyberwatch Finland's services improve decision-makers’ strategic situational picture and enable successful holistic cyber risk management.

DartPoints

DartPoints

DartPoints helps bridge the digital divide by delivering cloud, colocation, managed services + edge infrastructure.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

63 Moons Technologies (63MT)

63 Moons Technologies (63MT)

63 Moons Technologies is a world leader in providing next-generation technology ventures, innovations, platforms, and solutions.

Omdia

Omdia

Omdia is a technology research and advisory group. Our deep knowledge of tech markets combined with our actionable insights empower organizations to make smart growth decisions.

Tychon

Tychon

Tychon develops advanced enterprise endpoint management technology that enables commercial and government organizations to bridge the gap between security and IT operations.

Opkalla

Opkalla

We started Opkalla because we believe IT professionals deserve better. We help our clients navigate the confusion in the marketplace and choose the solution that is right for your business.

Sword Group

Sword Group

Sword is a leader in data insights, digital transformation and technology services with a substantial reputation in complex IT, business projects and mission critical operations.

Replica

Replica

Replica creates authentic virtual environments that ensure identities and assets are always protected no matter where or what work needs to get done.