FREE TO VIEW


« Back to News

2023-02-03

Latvia's Defence Ministry Targeted  

AKA Primitive Bear: A Russian hacking group called Gamaredon has been delivering a phishing attack on Latvia’s Ministry of Defence.

2023-02-02

Ransom Attack On Financial Services Software Supplier 

Ransom Attack: A key supplier of trading software to the City of London with a vital role in the trading of debt, derivatives & shares worldwide.

2023-02-02

Cyber Attack On Ship Management Operating Technology

Ransom Attack Drives Ships Offline: A thousand vessels operated by many maritime customers were affected in a supply chain breach.

2023-02-01

Choose the best web application firewall for you

Learn how a web application firewall (WAF) increases security and helps you meet PCI compliance. Watch Now

2023-02-01

Boards Need To Step Up Or Risk Cybersecurity Fines

Cyber Security Is A First Rank Issue For Business: Firms without cyber resilience strategies are putting their futures on the line. By Rob Demain

2023-01-30

US Strategy Will Allow Hacking Criminal & Foreign Networks 

Rendering Malicious Actors Incapable: The new strategy will “disrupt and dismantle” hostile networks as part of a persistent, continuous campaign. 

2023-01-30

Turla Hackers Deliver Andomeda Malware 

Andromeda is typically deployed by hackers using an infected USB drive and is most frequently used for malware delivery and credentials theft.

2023-01-30

Ukraine Claims Russian Cyber Attacks Are War Crimes

The cyber domain has no borders, allowing attackers to instantly reach across the world, which makes it vital to hold Russia's hackers accountable.

2023-01-30

Microsoft To Invest $10b In OpenAI 

Generative Artificial Intelligence: Microsoft is planning to make a massive startup investment in the company behind ChatGPT and DALL·E.

2023-01-28

How Can SASE Boost Information Security?

Secure Access Service Edge: SASE can provide a comprehensive level of protection against cyber threats & simplify security management.

2023-01-27

Bridging The Detection & Response Gap

Failure To Adapt: As cyber attackers move faster, here are five ways organisations can stay ahead of them. By Matt Lawrence & Dan Green

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Phoenix Datacom Limited

Phoenix Datacom Limited

Phoenix Datacom is a provider of solutions and professional services to improve the performance & security of data centres, networks and applications.

RISA

RISA

RISA solutions help to secure networks, improve overall network security, and achieve government regulatory compliance.

LRQA

LRQA

LRQA are a leading global assurance provider, bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training.

Decision Group

Decision Group

Decision Group are a Total Solution Supplier offering Network Forensics and Lawful Interception tools.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

ArcusTeam

ArcusTeam

ArcusTeam is at the forefront of the firmware and applications security industry, with a mission to increase the level of security on all IoT devices and applications.

IoT Cybersecurity Alliance

IoT Cybersecurity Alliance

IoT Cybersecurity Alliance is where industry-leading IoT security providers and top IoT experts come together to establish and share best practices to secure the IoT ecosystem for the good of all.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

About Cyber Security.

About Cyber Security.

About Cybersecurity provides a galaxy-wide knowledge base of cybersecurity tactics and techniques derived from actual experience.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

Cybaverse

Cybaverse

Cybaverse (formerly North Star Cyber Security) was founded to create the perfect blend of a Managed Security Service Provider (MSSP) and a Cyber Security Consultancy in one.

LAVAAT

LAVAAT

At LAAVAT, our goal is to make it easy for our customers to build secure IoT devices without a need to invest considerably in embedded security and cryptography expertise.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.