For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2022-09-07

CIO & CISO Visions Leadership Summit - 9th to 11th October

Leadership Summit: Dedicated to IT and information security leaders; delivering the exact content, insight, connections & rewards you need.

2022-10-04

Iranian Hacking Group Deploys Customised Spyware

The Iranian state-sponsored hacking group known as APT42 has been discovered using custom Android malware to spy on targets of interest.

2022-10-03

Cyber Crime Weaponised: What Business Can Learn From Ukraine

A New Era Of Cyber Warfare: The cyber aspects of the conflict in Ukraine will continue to resonate long after the guns have been silenced.

2022-10-02

October Is Cyber Security Awareness Month

October: US Cybersecurity Awareness Month aims to raise awareness of cyber security risks and help people & businesses to protect their data.

2022-10-02

Hackers Have Exploited The Queen’s Death

#Evilproxy: Hackers are using the wave of condolences after the funeral of Britain's Queen Elizabeth to launch credentials phishing attacks.

2022-09-30

The Intercontinental Hotels Group was ‘Hacked for Fun!’

Password Qwerty1234: Hackers carried out a destructive attack against the global Intercontinental Hotels Group and deleted data "for fun".

2022-09-30

Ukraine Predicts A Massive Cyber Attack From Russia

After seven months of conflict and as winter approaches, Russia will target the energy sector to hurt Ukrainian civilians & threaten their security.

2022-09-30

Why Companies Need A Next-Gen Approach To Business Continuity

IT teams must reevaluate their approach to business continuity to withstand the threats coming at them fast and furious. By Florian Malecki

2022-09-29

How To Outsmart Increasingly Complex Cyber Attacks

Outsourcing elements of security can help organisations reach better security outcomes previously exclusive to large enterprises. By Leyton Jefferies

2022-09-28

British Girl’s Suicide Puts Spotlight On Social Media

Anxiety, Depression, Self-harm & Suicide: The death of a 14-year-old girl may prove a turning point in the regulation of social media in Britain.

2022-09-28

Denmark Wins 2022 European Cyber Security Challenge

Defend & Attack Under Pressure: ENISA's annual EU cyber security challenge competition set rival national teams against each other.

2022-09-28

Pivoting Customers' Mindsets For Cloud Security

When businesses increase cloud capability and cloud velocity, they often create new risk areas outside their familiarity. By JD Sherry

Subscribe!

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Code Decode Labs

Code Decode Labs

Code Decode Labs provides consulting for IT Technology, Cyber Security, Advanced Defense & Policing Technologies, Intelligent Networks, and Information Security.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Becrypt

Becrypt

Becrypt is a trusted provider of endpoint cybersecurity software solutions. We help the most security conscious organisations to protect their customer, employee and intellectual property data.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Cyberra Legal Services (CLS)

Cyberra Legal Services (CLS)

Cyberra Legal Services provides cyber law advisory, cyber crime consultancy, cyber law compliance audit, cyber security, cyber forensics and cyber training services.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Fortalice

Fortalice

Fortalice provide customizable consulting services built on proven methodology to strengthen your business cyber security defenses.

Cube 5

Cube 5

The Cube 5 incubator, located at the Horst Görtz Institute for IT Security (HGI), supports IT security startups and people interested in starting a business in IT security.

Active Navigation

Active Navigation

Active Navigation is a data privacy and governance software company.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Arqit Quantum

Arqit Quantum

Arqit's mission is to use transformational quantum encryption technology to keep safe the data of our governments, enterprises and citizens.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Persona

Persona

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.