For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2024-07-10

New AWS Webinar: Generative AI and Security

Watch Now: An expert overview of things to consider in leveraging generative AI for security and diving deeper into Amazon Bedrock.

2024-07-25

Israel-Hamas Conflict: The Escalation Of Cyberwarfare

Malware, Hacktivism & Disinformation: The ramifications of the Middle East cyberwar will impact organizations around the world. By Craig Watt

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-24

Beware The Ghost Stories Of Cyber Space

Presented with false & distorted information, magnified from multiple sources, US voters should ask these three questions. By Ron Marks

2024-07-24

Progress In Deepfake Detection

Identity Swaps: Researchers at Nanjing University have classified deepfakes Into four main types, each one posing a different threat.

2024-07-23

The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies

For CISOs, this event is a sharp reminder of the fundamental risks associated with over-reliance on a single supplier, especially in the cloud.

2024-07-23

Proposed British Digital Information & Smart Data Bill

Harnessing The Power of Data: An important move for data protection, particularly for reforms around Digital Verification Service. By David Varney

2024-07-23

AI Is Predicted To Replace Eight Million British Jobs

Jobs Apocalypse: Women, young workers and low-paid individuals face the greatest threat from the AI-driven automation of many jobs.

2024-07-22

New British Government Will Legislate On Cyber Security

Protecting Public Services from Cyber Attacks: The Cyber Security & Resilience Bill will expand existing regulation to ensure best practices.

2024-07-22

Student Who Sold Cyber Attack Software Is Jailed

DDoS For Sale: A student in Scotland gets a conviction for creating and distributing a mobile app he designed to disrupt corporate websites.

2024-07-20

MediSecure Hack - Half The Australian Population Affected

Around 13 million Australians have had their personal prescriptions and other healthcare data exposed in a hack that took place 3 months ago.

2024-07-20

NATO’s New Cyber Defence Centre Is In Belgium

Integrated Cyber Defence: NATO's new centre will bring together civilian & military personnel from all allied countries, plus industry experts.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Cysec - TU Darmstadt

Cysec - TU Darmstadt

CYSEC is the Cybersecurity faculty of the Technical University of Darmstadt and performs internationally renowned research in numerous areas of cybersecurity.

Source Defense

Source Defense

Source Defense provides websites with the first ever prevention technology for attacks of third-party origin.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

TeraByte

TeraByte

TeraByte is an information security company which helps to educate and protect businesses from cyber security related risks.

ThreatModeler

ThreatModeler

ThreatModeler is an automated threat modeling solution that fortifies an enterprise’s Software Development Lifecycle by identifying, predicting and defining threats.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

ConnectWise

ConnectWise

The Unified ConnectWise Platform offers intelligent software and expert services to easily run your business, deliver your services, secure your clients, and build your staff.

Drip7

Drip7

Drip7 is a micro-learning platform that is re-inventing the way companies train their employees and build lasting cultural change around the importance of cybersecurity.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Dope Security

Dope Security

Dope Security is a fly-direct Secure Web Gateway that eliminates the data center stopover architecture required by legacy providers, instead performing security directly on the endpoint.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.