NEWS > News Analysis


« Back to News

2023-07-13

A Perfect Storm For Cybercrime

Geopolitical Instability & Economic Uncertainty: Agility and flexibility are key, as threat actors are always evolving. By Fabien Rech

2023-07-14

A “Whole-of-Society" Approach To Cyber Crime

Active Cyber Defence: Britain's NCSC was notified of a suspicious email or website every five seconds in 2022 - that's 7.1m suspicious incidents.

2023-07-07

Discovered - High Risk Vulnerabilities Affecting A Leading Building Management System

Common Vulnerabilities & Exposures: An unintended vulnerability, built into the operating system, might allow attackers remote access.

2023-07-03

Thousands Of WordPress Sites Exposed 

Ultimate Member Plugin: Over 200,000 WordPress sites have a newly found security defect, leaving them dangerously exposed to hackers.

2023-06-29

Today’s CISO: How The Role Has Evolved

A Transformational Role: CISOs are integral to fundamental business decisions and are now entitled to a seat at the boardroom table. By Frank Kim

2023-06-28

Browser-Based Social Engineering Trends

Watchguard's latest report shows three of the four new malware threats originated in China and Russia with living-off-the-land attacks on the rise.

2023-06-26

Employees To Blame For 70% Of Corporate Data Breaches

The Remote Work Time Bomb: Organisations must rebuild a culture that ensures everyone has a security-first mindset, wherever they’re working.

2023-06-27

Canada Challenges Meta Over Access To News

Meta has announced it will shut down access to news on Facebook and Instagram in Canada in a dispute over payment to local sources.

2023-06-29

British Universities Vulnerable To Credentials Fraud

Two Million Breached Credentials: British universities are at high risk of cyber security breaches caused by attacks launched using stolen identities.

2023-08-07

Email Impersonation Attacks Reach All-Time High

Email impersonation comprises over 90% of threats observed in corporate inboxes and almost all of those are credentials-based theft attacks.

2023-08-08

Only Half Of Citizens Are Happy With Digital Public Services

People are used to the convenience of e-commerce interactions and expect the same service levels in their interactions with government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

United Biometrics

United Biometrics

United Biometrics is an anonymous and real-time authentication platform designed to stop the fraud for mobile payments, e-Commerce and applications.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Profian

Profian

Profian’s hardware-based solutions maintain your data's confidentiality and integrity in use, providing true confidential computing to meet regulatory and audit requirements.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

NexusTek

NexusTek

NexusTek is a managed IT services provider with a comprehensive portfolio comprised of end-user services, cloud, infrastructure, cyber security, and IT consulting.