FREE TO VIEW


« Back to News

2024-07-02

Cyber Threats To The British Elections

Imminent General Eelection: Threat actors could seek to exacerbate domestic political divisions regarding the primary electoral issues.

2024-07-03

Treading A Safe Path - Navigating Hidden Ransomware Risks

Urgent Decisions - To Pay Or Not To Pay?: It’s not just a financial transaction, but a complex legal & ethical minefield. By Rob Smith

2024-07-03

London Hospitals Were Attacked By Russian Hackers

An attack on the NHS was accurately predicted months before Russia's Qilin hackers struck London hospitals in a supply chain exploit.

2024-07-02

RCE Vulnerability In OpenSSH Server

OpenSSHion: An old vulnerability has resurfaced and millions of systems are exposed to unauthorised control, needing urgent mitigation.

2024-07-08

AI Has The Power To Transform Healthcare Cyber Security

The British healthcare sector is set for transformation driven by advances in Artificial Intelligence - can it also protect sensitive data?

2024-07-02

Australian Banks Suffering Intense Cyber Attacks

Australia's big four banks are undergoing constant cyber attacks as criminals deploy new purpose-built malware targeting mobile phone users.

2024-07-07

2024 State Of Network Security

Security, Continuity & Compliance: Identifying key trends in cloud platform adoption, deployment of firewalls SD-WAN and SASE implementation.

2024-07-15

Journalism’s Future With AI

Artificial Intelligence is transforming many industries. The future of journalism and the whole content creation business is changing with it.

2024-07-04

Hacker Responsible For Wiper Malware Identified

WhisperGate: The US is offering a $10m reward for information about the whereabouts of a Russian hacker behind damaging attacks on Ukraine.

2024-07-02

Taiwan Targeted In Espionage Campaign

Chinese state-sponsored hackers are targeting Taiwan, including universities, state agencies, electronics manufacturers & religious organisations.

2024-07-04

Preparing For A South China Sea Cyber Storm

China’s geopolitical interests are likely to result in surging nation- state cyber operations before the US Elections. By Craig Watt

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Resilient Information Systems Security (RISS)

Resilient Information Systems Security (RISS)

RISS is a research group is in the Department of Computing at Imperial College London.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Dragos

Dragos

Dragos has built the first industrial cybersecurity ecosystem, the ultimate security defense.

Khipu Networks

Khipu Networks

Khipu Networks is an award winning Cyber Security Company delivering a wide range of network, wireless and security solutions, technologies and services across multiple sectors.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Frenos

Frenos

The Frenos Platform helps enterprises understand their most probable attack paths while highlighting the most effective risk mitigations to deter and defend against today’s adversaries.