FREE TO VIEW


« Back to News

2018-09-24

Chinese Cybercrime Group Launches Destructive Malware Family

Destructive malware pretends to ask for ransom, but in fact steals and deletes victims’ data as it self-propagates itself, searching for new targets.

2018-09-24

British Government Is Planning Internet Regulation

New rules would involve producing a single legal framework for internet safety and increasing the legal liability for sites with illegal content.

2018-09-24

Europol Warning: 15 Ways To Become A Cybercrime Victim

From ransomware through to cryptocurrency scams, Europol says it wants to stop criminals from making you a victim.

2018-09-24

Former MI5 Chief Wants Retaliatory Attacks On Russia

Ex security chief Stella Rimington urges Britain to meet Russian "aggression with aggression" and launch retaliatory cyber attacks against Moscow.

2018-09-24

Manufacturing Industry: A Key Target For Cyber Attackers

As manufacturing industry is becoming better connected, the frequency and sophistication of cyber attacks is going up.

2018-09-24

Are Colleges Teaching Real-World Cyber Security Skills?

Cyber Skills Shortage: There seems to be a growing chasm between what graduates learn in school and what the jobs market demands.

2018-09-21

UK Gets Offensive: New Task Force To Deal With Russia & Terrorists

Britain will step up its counter offensive against threats from Russia and terrorist groups with a joint task force between the MoD and GCHQ.

2018-09-21

Spyware Proliferates To 45 Countries

Pegasus spyware, which targets iPhones and Android devices, has infiltrated numerous countries where its is used to abuse human rights.

2018-09-21

Has Demand For Cyber Security Skills Hit Crisis Point?

The UK Parliament's Joint Committee on the National Security Strategy has published a report that exposes the UK's chronic lack of digital skills.

2018-09-21

Millions Of WiFi Routers Are At Risk Of Hacking

Millions of WiFi networks are vulnerable due to weaknesses in how saved passwords in web browsers interact over unencrypted connections.

2018-09-20

UK Fallout From The Massive Breach At Equifax

The ICO has issued Equifax’ UK subsidiary with the maximum fine of £500,000 for failing to protect personal information of 15m UK citizens.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Synopsys

Synopsys

Synopsys is a global leader in electronic design automation and semiconductor IP and is growing its leadership in software quality and security solutions.

National Cyber and Information Security Agency (NUKIB) - Czech Republic

National Cyber and Information Security Agency (NUKIB) - Czech Republic

NUKIB is the central Czech government body for cyber security, the protection of classified information in the area of information and communication systems and cryptographic protection.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

CASES.lu

CASES.lu

CASES.lu is a government-driven initiative offering awareness-raising, a web resource and other tools to assist SMEs concerning information security.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

Resistant AI

Resistant AI

Resistant AI protects against evolving online fraud. We connect the dots to provide a new layer of trust and performance for our clients’ systems.

SearchInform

SearchInform

SearchInform is a leading risk management product developer, protecting business and government institutions against data theft, harmful human behavior, compliance breaches and incomplete audit.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Stealth-ISS Group

Stealth-ISS Group

Stealth–ISS Group is your extended IT, cyber security, risk and compliance team, providing strategic guidance, engineering and audit services, along with technical remediation and security operations.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

FINX Capital

FINX Capital

FINX strives to solve the cybersecurity issues with its proprietary technolog, FINX SHIELD, by utilizing big data, blockchain combined with artificial intelligence.

Plante Moran

Plante Moran

Plante Moran is a leading audit, tax, consulting, and wealth management firm. Areas of consulting expertise include cybersecurity.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Everfox

Everfox

Everfox, formerly Forcepoint Federal, has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.