FREE TO VIEW


« Back to News

2021-06-14

FBI Recover Ransom Paid To Pipeline Hackers

The FBI has recovered most of the $4.4 million ransom payment made to Russian hackers after a cyber attack on the largest fuel pipeline in the US.

2021-06-14

Singapore Is The Cyber Attack Hotspot

Leading cyber security firms agree that Singapore is the regional focus for being both the source and the target of growing threat activity.

2021-06-11

Equality Goes Missing In The Digital Industry

Women are less likely than men to have specialist digital skills or work in digital technology and are poorly represented in senior leadership jobs.

2021-06-10

Closing The Space Between Cybercrime & Cybersecurity

Failing to understand the intersection between the threats posed by cybersecurity and cybercrime leaves blind spots wide open to exploitation.

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

2021-06-08

Future Threats Are Growing Closer

Cyber security experts are becoming more concerned about the near term future when cyber attacks will be driven by Artificial Intelligence.

2021-06-08

Identifying & Minimizing Security Vulnerabilities For Your Organization

Despite the very best security efforts, small flaws in cyber security architecture can pose a great threat to business assets and operations.

2021-06-07

Fake Finance Apps Focus On Theft

Fake banking, trading and crypto-currency apps are being used by criminals to steal money and financial information from unsuspecting users.

2021-06-07

Microsoft’s Defensive Playbook

Microsoft is offering a series of incident response ‘playbooks’, giving advice to business leaders on how to defend against cyber attacks.

2021-06-07

Russian Hackers Targeting International Aid Groups

Intelligence Gathering Effort : An estimated 3,000 email accounts at more than 150 different organisations have been attacked this month.

2021-06-07

Huawei Chooses UAE As Cyber Security Hub

Huawei is helping UAE to establish Smart City and e-governnent infrastructure to create a "globally trusted digital oasis” safe from cyber threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

APWG

APWG

APWG is the international coalition unifying the global response to cybercrime across industry, government, law-enforcement and NGO communities.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

Steganos

Steganos

Steganos offers highly secure and easy to use software tools that protect and secure on and offline data.

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

Center for Analysis & Investigation of Cyber-Attacks (CAICA)

The Center for Analysis & Investigation of Cyber-Attacks is one of the leading Kazakhstan organisations in the field of information and computer security.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Get Indemnity

Get Indemnity

Get Indemnity are specialist insurance brokers with experience working on a wide range of innovative business insurance products that combine risk management, indemnity and incident response services.

High Wire Networks

High Wire Networks

High Wire Network’s Overwatch Managed Security Plaform-as-a-Service offers organizations end-to-end protection for networks, data, endpoints and users.

SoloKeys

SoloKeys

SoloKeys provides the first open-source FIDO2 security key: Protect your online accounts against unauthorized access by using the most secure login method.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.

Apollo Secure

Apollo Secure

Apollo is an automated cybersecurity platform for startups and small businesses to achieve and maintain security compliance.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

CMIT Solutions

CMIT Solutions

CMIT Solutions is a recognized leader in Managed IT Services for businesses. We empower businesses like yours by providing innovative technology solutions, managed IT services and cybersecurity.

Assetnote

Assetnote

The Assetnote platform enables organizations to effectively map and continuously monitor their external attack surface.

Staley Technologies

Staley Technologies

Staley Technologies is a US nationwide structured cabling, technology integrator, and Managed IT & Cyber Security provider.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.