FREE TO VIEW


« Back to News

2020-12-20

Tech Support Scams Steal Millions

Criminals are cold calling victims, pretending to be from reputable ISPs, claiming that the victim has a problem with their computer or internet.

2020-12-18

The End Of The American Cyber Empire

Russia has accomplished the goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. By Ronald Marks

2020-12-18

Russian Hackers Have Stolen US Secrets

Some of The USA's most deeply held secrets may have been stolen by Russian government hackers in a heavy multi-pronged attack just revealed.

2020-12-17

Business Cyber Security Spending In 2021

Although more exposed than ever, PWC say that 25% of organisations are planning to downsize their cyber budgets in the forthcoming 12 months.

2020-12-16

Europol Warning Of The Growing AI Cyber Threat

AI will become increasingly popular among cyber criminals who are beginning to use it to target their victims and to maximise hacking operations.

2020-12-16

Practice Makes Protected – CYRIN’s Tools Packages

BRAND NEW! – See the New Cyber Tools Packages from CYRIN – Find out about CYRIN's virtual cyber range. Get Your Free Trial.

2020-12-15

E-Businesses That Don’t Require Employees

Starting a business that doesn't require employees keeps overhead expenses down and intelligent use of Technology makes a really big difference.

2020-12-15

Insider Security Risk Soars During Lockdown

User behavior under lockdown is a dominant risk and 58% of IT professionals believe employees might ignore security rules and put data at risk.

2020-12-15

The Personal Data Being Used To Get Your Vote

Everything about you, from your phone number to your salary and home address, is collected and traded by political campaigns and consultants.

2020-12-14

Ethiopian Telecoms System Has Critical Security Flaws

A white-hat hacker has found critical security flaws in Ethiopia’s mobile telecom network that would allow hackers to control the entire system.

2020-12-14

US Government Agencies Under Attack

CISA issues an emergency warning that nation-state hackers have weaponise software used by many federal agencies and leading businesses.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

National Defence Radio Establishment (FRA) - Sweden

National Defence Radio Establishment (FRA) - Sweden

The National Defence Radio Establishment (Försvarets Radioanstalt), is the Swedish national authority for Signals Intelligence, also providing Information assurance services to government authorities.

Israel Aerospace Industries (IAI)

Israel Aerospace Industries (IAI)

IAI offers a holistic approach that provides defense forces, governments, critical infrastructures and large enterprises with end-to-end cyber security & monitoring tools.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).

Symantec

Symantec

Symantec delivers data-centric hybrid security for the largest, most complex organizations in the world – on devices, in private data centers, and in the cloud.

Stratejm

Stratejm

Stratejm, a Next Generation Managed Security Services Provider, brings innovation and thought leadership to the fight against cyber criminals.

Guardara

Guardara

Guardara's mission is to help our customers to continuously improve in every aspect of software development.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Cyber Insurance Academy

Cyber Insurance Academy

Cyber Insurance Academy was founded to provide insurance professionals with the knowledge needed to work in cyber-insurance and cyber-related insurance fields.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Collabera Digital

Collabera Digital

Collabera Digital engineer the next generation of solutions that power tech-forward organizations and create an impact on people and communities.

Eqlipse Technologies

Eqlipse Technologies

Eqlipse Technologies provides products and high-end engineering solutions to customers in the Department of Defense and Intelligence Community.

We Hack Purple

We Hack Purple

We Hack Purple is a Canadian company dedicated to helping anyone and everyone create secure software.

Linx Security

Linx Security

The Linx Identity Security platform enables identity, security, and IT ops teams to finally control the whole identity lifecycle.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.