FREE TO VIEW


« Back to News

2021-06-07

US Media Group In Latest Ransom Attack

Live streams for radio and TV stations owned by the Cox Media Group have been knocked offline in an undisclosed ransom attack.

2021-06-04

Cyber Security Mergers & Acquisitions - May 2021

Cybersecurity mergers and acquisitions activity continued at a high rate in May with 35 deals involving companies from 12 countries.

2021-06-02

Avoiding The Privacy Paradox In The Workplace

Internet users are rightly becoming more concerned about data tracking and their personal privacy. There are some ways to get protection.

2021-06-02

Online Fraud Costs British Investors £63m

Over 12 months 5,039 reports of investment fraud made reference to a social media platform, with over a third of complaints involving Instagram.

2021-06-02

Cyber Security: Its Good To Talk

Cyber security is all about the human factor and being transparent about mistakes can help your organisation's people learn to stay safe online.

2021-06-01

Preventing Ransomware Attacks

The chances of ransomware infection can be significantly reduced by security software and by paying sufficient attention to some basic rules.

2021-06-01

Denmark Helped NSA Spy On European Union

Denmark gave the US spy agency access to internet data streams and intercepted critical voice, text & data communications between EU leaders.

2021-05-31

Ransomware And Its Criminal Use

Ransomware attackers are ferocious. If you haven’t been attacked yet, it’s not a matter of if, but when. Be prepared. Defend, backup and protect.

2021-05-31

Get The Best Cyber Security Audits & Training

Organisations often invest heavily in cyber security technology, but they don’t spend enough time on training, audit and the vital human factor.

2021-05-31

WEBINAR: How To Architect An Identity Management Strategy In AWS

17th June | An IAM strategy can help organizations grant users and customers access to the right resources under the right conditions.

2021-05-31

Missing Patches Place Security At Risk

Public sector security professionals admit that one in three UK breaches result from vulnerabilities that they should have already patched.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Hillstone Networks

Hillstone Networks

Hillstone Networks offers a broad range of security solutions for enterprises and data center networks – whether physical, virtual, or in the cloud.

Agari

Agari

Agari is the Trusted Email Identity Company™, protecting brands and people from devastating phishing and socially-engineered attacks.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Depth Security

Depth Security

Depth Security assessment services provide organizations with real-world visibility into threats facing their infrastructure and applications.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

Quantum Star Technologies

Quantum Star Technologies

Quantum Star Technologies has developed Starpoint to be a next-next-generation solution to cyber security threats. Our mission is to secure the online world through our patented technology.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

Cyera

Cyera

Cyera is the data security company that gives businesses context and control over their most valuable asset: data.

RSK Cyber Security

RSK Cyber Security

RSK Cyber Security are a leading cyber security services company that uses services, consulting, and product knowledge to lower security risk across the board.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

RapidSpike

RapidSpike

RapidSpike is the only website monitoring solution that focuses all three key aspects of website health: performance, reliability AND security.

NVISO Security

NVISO Security

NVISO is a pure-play cyber security consulting firm, focused mainly on the Financial Sector, the Technology Sector, and Government & Critical Infrastructure.