FREE TO VIEW


« Back to News

2023-06-07

Ransomware Trends In The Aviation & Maritime Industries

Transport sector organisations have a distinctive profile from an attacker’s perspective, making them an especially lucrative target.

2023-06-07

Update: BBC, British Airways & Boots In Supply Chain Attack

CLOP: Hackers found a software vulnerability to penetrate a growing number of UK firms in a major supply chain exploit. Now they want ransom.

2023-06-06

British Business Moves To Adopt Digital Identity

More than half of UK organisations either currently use digital identity or plan to soon incorporate digital identity solutions into their operations.

2023-06-05

Musk's Brain Chip Firm Gets US Approval for Human Analysis

Elon Musk's brain-chip company Neuralink has now been approved by the US Food and Drugs Administration (FDA) to conduct human tests.

2023-07-05

Advanced Phishing Attacks Tripled In 2022

Protecting Organisations Is More Important Than Ever: Hackers are using new tools to simplify & automate the process of generating attacks.

2023-07-12

Iranian Hackers Using Windows Kernel Driver

Agrius Threat Group: Iranian hackers are using a new Windows kernel driver called Wintapix to get unauthorized access to targeted systems.

2023-06-07

A New Approach To Cyber Security Helps Resist Extortion

Nearly 80% of organisations hit by ransomware are capable of recovering their critical data & systems, without paying a ransom.

2023-07-05

A Decade Of ‘Bad Magic’ In Cyber Espionage

Sophisticated Malicious Activities: A modular framework codenamed CloudWizard, which can take screenshots, record microphones & steal Gmail.

2023-07-04

The Limitations of AI

'Truth Is The Bottom Line': Carl Bernstein has warned that Artificial Intelligence is creating serious challenges for the future of journalism.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

cPacket Networks

cPacket Networks

cPacket’s distributed intelligence enables network operators to proactively identify imminent issues before they negatively impact end-users.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Dataprise

Dataprise

Dataprise is a leading IT managed services provider offering IT Management and Help Desk Support Services, Cloud Services, Information Security Solution, IT Strategy and Consulting.

Open Data Security (ODS)

Open Data Security (ODS)

Open Data Security is a market leader in the information security sector, offering services to companies, governments and individuals, helping them shield from hackers and cyber attacks.

Pillr

Pillr

Pillr is a cybersecurity operations platform capable of adapting to the demands of your business and team — and the global threat landscape.

Ostrich Cyber-Risk

Ostrich Cyber-Risk

Ostrich Cyber-Risk is a risk management company that helps organizations reduce the complexity of identifying financial and operational risks related to your cybersecurity posture.

Appknox

Appknox

Appknox is the world’s most powerful plug-and-play security platform that helps developers, security researchers, and enterprises to build a safe and secure mobile ecosystem.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.