News

2023-02-03

Latvia's Defence Ministry Targeted  

AKA Primitive Bear: A Russian hacking group called Gamaredon has been delivering a phishing attack on Latvia’s Ministry of Defence.

2023-02-02

Ransom Attack On Financial Services Software Supplier 

Ransom Attack: A key supplier of trading software to the City of London with a vital role in the trading of debt, derivatives & shares worldwide.

2023-02-02

Cyber Attack On Ship Management Operating Technology

Ransom Attack Drives Ships Offline: A thousand vessels operated by many maritime customers were affected in a supply chain breach.

2023-02-01

Choose the best web application firewall for you

Learn how a web application firewall (WAF) increases security and helps you meet PCI compliance. Watch Now

2023-02-01

Boards Need To Step Up Or Risk Cybersecurity Fines

Cyber Security Is A First Rank Issue For Business: Firms without cyber resilience strategies are putting their futures on the line. By Rob Demain

2023-01-30

US Strategy Will Allow Hacking Criminal & Foreign Networks 

Rendering Malicious Actors Incapable: The new strategy will “disrupt and dismantle” hostile networks as part of a persistent, continuous campaign. 

2023-01-30

Turla Hackers Deliver Andomeda Malware 

Andromeda is typically deployed by hackers using an infected USB drive and is most frequently used for malware delivery and credentials theft.

2023-01-30

Ukraine Claims Russian Cyber Attacks Are War Crimes

The cyber domain has no borders, allowing attackers to instantly reach across the world, which makes it vital to hold Russia's hackers accountable.

2023-01-30

Microsoft To Invest $10b In OpenAI 

Generative Artificial Intelligence: Microsoft is planning to make a massive startup investment in the company behind ChatGPT and DALL·E.

2023-01-28

How Can SASE Boost Information Security?

Secure Access Service Edge: SASE can provide a comprehensive level of protection against cyber threats & simplify security management.

2023-01-27

Bridging The Detection & Response Gap

Failure To Adapt: As cyber attackers move faster, here are five ways organisations can stay ahead of them. By Matt Lawrence & Dan Green

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

ON-DEMAND WEBINAR: How to improve your security posture with a web application firewall (WAF)

Watch this webinar to discover how a WAF goes beyond a standard firewall and helps you meet security industry compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SWAMP

SWAMP

SWAMP offers a suite of secure and dependable analysis services, to help reduce the number of security vulnerabilities deployed in software.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Cybonet

Cybonet

Cybonet is committed to empowering organizations of all sizes with the tools and capabilities to detect and engage cyber security threats.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

Volatility Foundation

Volatility Foundation

Volatility is an open source memory forensics framework for incident response and malware analysis.

Protec

Protec

Protec is a leader in cyber resilience providing information security, risk management and audit services – bringing stability and peace of mind to our customers.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

spriteCloud

spriteCloud

spriteCloud is an independent software testing, test automation and cybersecurity services provider.

Certification Forest

Certification Forest

Certification Forest are one of the leading certification training providers across the world.

Zeva

Zeva

Zeva solves complex identity and encryption challenges for the federal government and corporations around the globe.

Moro Hub

Moro Hub

Moro Hub, a subsidiary of Digital DEWA, is a UAE-based digital data hub focused on digital transformation and operational services.

Fireblocks

Fireblocks

Fireblocks is a digital asset security platform that helps financial institutions protect digital assets from theft or hackers.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.