FREE TO VIEW


« Back to News

2024-03-01

Ransomware: The True Cost To Business

Paying Ransom Does Not Work: Organisations should really focus on detection & prevention tactics before a damaging attack happens.

2024-02-28

Harnessing Predictive Analytics In Cybersecurity

Proactive Cybersecurity: Harnessing the power of predictive analytics in cybersecurity is not an opportunity. It's an imperative. By Alexander Norell

2024-02-28

DMARC Email Validation: Cracking Down On Fraud

Google & Yahoo mail services are introducing changes starting soon that will make your inbox a safer place for both legitimate senders & recipients.

2024-02-26

Data Leak Exposes China’s Hackers For Hire 

Nation-State Hackers Exposed: I-Soon has abilities to breach foreign governments, infiltrate social media accounts & hack personal computers.

2024-02-23

Cyber Insurance For Industrial Companies - Its Complex

Industrial firms face big challenges & complex processes to get cyber insurance cover, leaving many of them excluded. By Edgardo Moreno

2024-02-23

Cybersecurity, Volt Typhoon & The Grid

As IT becomes more and more a part of OT, the growing reliance of the grid on digital systems increases the possibility of cyberattacks.

2024-02-23

A European Cybercrime Breakthrough Is Only Half The Battle

The First Rule Of Cybercrime Is That No One Goes To Prison: Cybercrime is global in nature but criminal laws are intensely local. By Emily Taylor

2024-02-24

Major US Mobile Network Failure

The US had a lengthy cellular outage last week with thousands reporting connectivity issues. affecting AT&T, T Mobile, Verizon and other networks.

2024-02-26

AI Targeted Drones Are Not Working

Both Ukraine & Russia have deployed small military drones that use AI to identify and select potential targets, but with no measurable effect.

2024-03-19

The Surge In Ransomware & AI Defence Innovations

Ransomware Evolution: Investing in stronger defences with AI-powered and cloud-delivered cyber security is key to protect against the new threats.

2024-02-22

Rhysida Ransomware Cracked & Decrypted

A Cyber Security Dilemma: A decyrptor tool that helps victims recover from a Rhysida malware infection will alert the hackers to try harder.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

PerimeterX

PerimeterX

PerimeterX is the leading provider of solutions that secure digital businesses against automated fraud and client-side attacks.

MISP Project

MISP Project

The MISP threat sharing platform is a free and open source software helping information sharing of threat intelligence including cyber security indicators.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

IPification

IPification

IPification is a highly secure, credential-less, network-based authentication solution for frictionless user experience on mobile and IoT devices.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Reflectiz

Reflectiz

Reflectiz empowers digital businesses to make all web applications safer by non-intrusively mitigating any website risks without a single line of code.

Securolytics

Securolytics

Securolytics offers the simplest, most complete and affordable IoT security for all organizations. Securolytics quickly identifies unmanaged devices to reduce security and compliance risks.

Crowe

Crowe

Crowe is a public accounting, consulting, and technology firm that combines deep industry and specialized expertise with innovation.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

Axians

Axians

Axians supports its customers in their digital transformation journey. We offer ICT solutions and services in areas including Enterprise Networks and Cybersecurity.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

DNSFilter

DNSFilter

DNSFilter is the most accurate threat detection and content filtering tool on the market today.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.