FREE TO VIEW


« Back to News

2020-07-29

Vital Necessity Of Cloud Computing Highlights Security Risks

Orca Security's research finds that public cloud environments are rife with neglected workloads, authentication issues and lateral movement risk.

2020-07-27

Home Working Cyber Security Toolkit

Home working staff can test their defences against online threats in a new roleplay exercise devised by the UK National Cyber Security Centre.

2020-07-27

US National Cyber Defense Policy

The US Government will spend $740 billion on its cyber defenses next year, co-ordinating public and private response to threats for the first time.

2020-08-03

Use Machine Learning To Predict What Is Most Likely To Be Exploited.

Risk-based vulnerability management helps you prioritize your remediation efforts to focus on the assets that matter most. Download Free e-Book.

2020-07-22

The British Government 'badly underestimated' Russian Political Interference

A critical official Parliamentary Report says that the UK government made no effort to investigate Russian interference in its democratic processes.

2020-07-21

Malware Found In Chinese Banking Software

Discovered: Malware embedded in tax software that Chinese banks require corporations to install to conduct business operations in China.

2020-07-30

Easing Out Of Lockdown: Why Should Cyber Security Remain High On The Agenda?

With the dramatic impact of Coronavirus across the globe and remote working prevalent, now is the perfect time to get your cyber security in order.

2020-07-20

Google Doubles Down On India

A $10 billion investment focused on enabling affordable access to the Internet and to information for every Indian in their own language.

2020-07-17

North Korean Hackers Have Stolen $2billion

North Korea has stolen $2 billion from financial organisations and crypto-currency exchanges in a global campaign of hacking, fraud and deception.

2020-07-17

Russian Hackers At Work Stealing Coronavirus Vaccine Data

Russia stands accused of directing its elite hackers to breach research labs and steal vital data in the search for a Coronaviris vaccine.

2020-07-16

Confirmed: US Cyber Attack On Russia In 2018

President Trump says the US conducted a covert cyber attack against Russia's Internet Research Agency during the 2018 midterm elections.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Verisec International

Verisec International

Verisec International AB is a Swedish Tech company focused since inception in enabling Trust in Digital Transactions, through the development of proprietary cutting-edge technologies and services.

Bsquare

Bsquare

Bsquare DataV software and engineering services help enterprises implement business-focused Internet of Things systems.

Avatu

Avatu

Avatu specialise in providing clients the advice, technology and tools they need to fight cyber and insider threats.

SecuLution

SecuLution

SecuLution is an Antivirus product using Application Whitelisting which offers much more protection than Virus Scanners ever can.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Cyscale

Cyscale

Cyscale automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

EOL IT Services

EOL IT Services

EOL IT Services is the UK’s most accredited provider of IT Asset Disposal (ITAD), Lifecycle Services and Data Destruction.

THEC-Incubator

THEC-Incubator

THEC-Incubator program is designed for international and ambitious tech startups in the Netherlands. Areas of focus include Blockchain and Cyber Security.

Enet 1 Group1

Enet 1 Group1

Enet 1 Group audits, assesses, recommends, and delivers tested solutions for the ever-increasing threats to your critical systems and digital assets

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

Sansec

Sansec

Sansec is the global leader in eCommerce malware and vulnerability detection. We help you to stay ahead of hackers!

Modern Networks

Modern Networks

Modern Networks is a leading provider of IT managed services to the UK’s commercial property sector and medium sized enterprises.

ANSSI Burkina Faso

ANSSI Burkina Faso

ANSSI is responsible for managing the security of information systems and cyberspace in Burkina Faso.

Edge Security

Edge Security

Edge Security is an information security research and consulting firm of expert hackers.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.