NEWS > Cybersecurity News


« Back to News

2022-07-06

Global Government Spending On IT To Grow 5%

Global government IT spending is forecast to be $565.7 billion in 2022, an increase of 5% from 2021, and cloud solutions will take a bigger share.

2022-07-11

CISA Detects Many New Cyber Security Vulnerabilities

CISA has detected 36 new vulnerabilities in frequent use by cyber criminals as attack vectors posing significant risks to government & business.

2022-07-08

Future Phishing Attacks Will Use Generative Machine Learning

Phishing attacks will get more sophisticated as criminals turn to Machine Learning techniques that can analyse datasets & generate attack vectors.

2022-06-16

Fixing The Cyber Security Workforce Gap

Recruiting entry level & junior staff and investing in their professional development results in more resilient, sustainable cyber security teams.

2022-06-08

Global Cyber Security Insurance Market Will Grow To $61.2B

Growing security threats and financial losses are expected to push the market for cyber security insurance to US$ 61.2 Billion by the end of 2032.

2022-06-08

Deactivated Domains Used For Spear-Phishing

Numerous domains used by Iranian hackers to enable a spear-phishing campaign to target devices and exfiltrate stolen information are shut down.

2022-06-23

For Sale: Academic Credentials

The FBI is warning universities & colleges that illegally obtained user accounts & other credentials are available for sale on the Dark Web. 

2022-06-21

Russia - Unplugged

Russia is all ready to drop off the worldwide web as a defensive measure to protect national infrastructure against foreign cyber attacks.

2022-06-15

Critical Business Systems Left Unmonitored & Insecure

Risky Business: Over 40% of companies don't include their core IT infrastructure systems in their routine cyber security monitoring activities.

2022-06-14

Ransomware’s Serious Effects On Cyber Security

Ransomware has rapidly evolved from a criminal 'malware incident' to a national security threat, in some cases successfully extorting $millions. 

2022-06-14

Estonia Fears Cyber Attacks Will Rise Because Of War In Ukraine

Estonia's cyber security is a critical investment and the nation is finding ways to improve resilience & build sophisticated offensive capabilities.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Oppida

Oppida

Oppida provides tailored IT security services to help you identify security gaps and assist in finding the most effective remediation.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Scanmeter

Scanmeter

Scanmeter helps identifying vulnerabilities in software and systems before they can be exploited by an attacker.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

QNu Labs

QNu Labs

QNu Labs’s quantum-safe cryptography products and solutions assure unconditional security of critical data on the internet and cloud across all industry verticals, globally.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Strike Security

Strike Security

Strike Security offers a continuous penetration testing platform that combines automation with ethical hackers.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

NuKuDo

NuKuDo

NukuDo redefine the boundaries of cybersecurity talent development. We are dedicated to cultivating top-tier professionals equipped to tackle the complex challenges of cybersecurity.