For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2024-07-10

New AWS Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-07-26

CrowdStrike’s Cyber Outage Will Cost $Billions

With regulatory penalties and many costly lawsuits in preparation, CrowdStrike's investors face $billions in fines, legal fees and lost revenue. 

2024-07-26

Wiz Rejects Google's $23b Acquisition Offer

Wiz has decided not to go forward with an unprecedented deal to be acquired by Google's parent and will remain an independent company.

2024-07-26

How Small Businesses Can Develop Cyber Resilience

To stay competitive, small businesses need to strengthen cyber resilience, secure their customer data & protect their IT systems. By Jochen Haller

2024-07-25

Israel-Hamas Conflict: The Escalation Of Cyberwarfare

Malware, Hacktivism & Disinformation: The ramifications of the Middle East cyberwar will impact organizations around the world. By Craig Watt

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-24

Beware The Ghost Stories Of Cyber Space

Presented with false & distorted information, magnified from multiple sources, US voters should ask these three questions. By Ron Marks

2024-07-24

Progress In Deepfake Detection

Identity Swaps: Researchers at Nanjing University have classified deepfakes Into four main types, each one posing a different threat.

2024-07-23

The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies

For CISOs, this event is a sharp reminder of the fundamental risks associated with over-reliance on a single supplier, especially in the cloud.

2024-07-23

Proposed British Digital Information & Smart Data Bill

Harnessing The Power of Data: An important move for data protection, particularly for reforms around Digital Verification Service. By David Varney

2024-07-23

AI Is Predicted To Replace Eight Million British Jobs

Jobs Apocalypse: Women, young workers and low-paid individuals face the greatest threat from the AI-driven automation of many jobs.

2024-07-22

New British Government Will Legislate On Cyber Security

Protecting Public Services from Cyber Attacks: The Cyber Security & Resilience Bill will expand existing regulation to ensure best practices.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Rambus Security Division

Rambus Security Division

Rambus Security Division solutions span areas including tamper resistance, content protection, network security, mobile payment, smart ticketing, and trusted provisioning services.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Positive Technologies

Positive Technologies

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

senhasegura

senhasegura

senhasegura is a global Privileged Access Management vendor. Our mission is to eliminate privilege abuse in organizations around the globe and build digital sovereignty.

Contextal

Contextal

Contextal develops cutting-edge open-source cybersecurity solutions, designed to connect the dots and detect complex threats, which slip through the existing protections.

Clarity

Clarity

Clarity is an AI cybersecurity startup that protects against deepfakes and new social engineering and phishing attack vectors accelerated by the rapid adoption of Generative AI.

WillCo Tech

WillCo Tech

WillCo Tech works to enhance national security and force readiness for military and commercial enterprises with a suite of software capabilities surrounding the human element of cybersecurity.