NEWS > News Analysis


« Back to News

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-04-24

Israeli Hacking Spyware In Widespread Use

New Israeli-made spyware resembling NSO Group's notorious Pegasus malware has been used to target journalists & politicians in many countries.

2023-04-17

Pakistan's Hackers Attack India's Education Sector

Transparent Tribe: A shift from attacking Indian military & government targets to disrupting educational institutions across India.

2023-04-14

Highly Evasive Adaptive Threats & Advanced Persistent Threats

There's a new kind of attacker, one that has learned to weaponize the most crucial tool for knowledge workers today - the web browser. By Mark Guntrip

2023-04-13

What The West's Caution Over Chinese Tech Really Means

The focus on China as a malicious security threat is somewhat of a distraction. The real battle is in military and economic power. By Dario Betti

2023-04-17

FBI Seizes $112m From 'CryptoRom' Criminals

Cryptocurrency Romance: A $multimillion fraud involves faking a romantic interest in the victim, linked to crypto currency investment scams.

2023-04-14

Japan’s Leading Companies Exposed To Ransomware

An attack on the Japanese IT company Fujitsu could cause a surge in ransom attacks by criminal hackers on companies & their customers.

2023-04-11

Increasing Cyber Attacks On Critical Infrastructure

Cyber attacks can have real-world consequences and recent 'near miss' incidents show just how disruptive the impact can be.

2023-04-11

Britain's National Cyber Force Reveals Its Operating Doctrine

Offensive Hacking: The NCF carries out daily operations to protect against national cyber threats. support military operations & prevent serious crime.

2023-04-05

The Skills Gap Is Increasing Risk & Exposure To Attack

The effects of the skills shortage are apparent, as organisations struggle to recruit sufficient talent & maintain security levels. By Jamal Elmellas

2023-04-05

President Biden Forbids Spyware From Government Use

President Biden has approved an Executive Order that bans US government use of the type of commercial spyware used by foreign states. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

Phirelight Security Solutions

Phirelight Security Solutions

Phirelight empowers an enterprise to easily understand how their networks behave, while at the same time assessing and managing cyber threats in real time.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Center for Education & Research in Information Assurance & Security (CERIAS)

Center for Education & Research in Information Assurance & Security (CERIAS)

CERIAS is one of the world’s leading centers for research and education in areas of information and cyber security.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Charles IT

Charles IT

Charles IT is your friendly, no-nonsense IT team focused on helping companies make their technology work for them. We focus on building relationships that deliver results.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

PureSquare

PureSquare

PureSquare exist to empower people with simple solutions for their increasingly complex digital security & online privacy needs.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.