For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2024-12-02

Is Zero Trust The Future Of Cybersecurity?

A zero-trust architecture is especially effective for organizations that use cloud applications and have lots of remote workers and locations.

2024-12-13

Chinese Firm Sanctioned For Potentially Lethal Cyber Attacks

Sichuan Silence: A Chinese cyber security firm has been sanctioned by the US for attacks exploiting a software vulnerability in corporate firewalls.

2024-12-13

Speciality Bakery Chain Hacked 

Krispy Kreme Donuts: A major cyber attack disrupted systems which resulted in lost production at the leading specialist bakery and retail outlet.

2024-12-13

Phishing Attacks Target Ukraine’s Defence Sector

A new Russian phishing campaign designed to infiltrate Ukrainian military & security networks, to gather intelligence & disrupting combat operations. 

2024-12-13

Best Cybersecurity Podcasts

A Key Medium: In technology, cybersecurity podcasts have taken the lead in fighting constantly fluctuating risks and digital security breaches.

2024-12-12

Strengthening Britain's Cyber Defences

Robust Regulation & Proactive Measures: Are current regulations good enough to tackle the sophisticated threats the UK faces today? By Rahul Tyagi

2024-12-12

What Security Features Are Essential In BPM Software To Protect Sensitive Data?

Effective business process management goes beyond spotting discrepancies. Good BPM software tools can streamline processes & maximize output.

2024-12-12

Trump 2.0: Cyberwarfare To Reach New Heights

With a realignment in world power dynamics, Trump's USA faces serious challenges for global cybersecurity throughout 2025. By Craig Watt

2024-12-11

Managing Zero-Day Vulnerabilities In The Real World

Mitigating Risks: Zero-day vulnerabilities present a huge risk for organizations, pulling DevSecOps teams in different directions. By Randall Degges

2024-12-11

FBI & CISA Advice - Use Encrypted Messaging

In response to the threat from Salt Typhoon's exploits, US mobile and broadband users are advised to adopt fully encrypted messaging services.

2024-12-11

British NHS Hospitals Under Attack

A Ceaseless Target: Ransom attacks on three Liverpool hospitals are just the latest in a series against NHS healthcare organisations in 2024.

2024-12-11

Ransomware Criminals Claim To Have Stolen Deloitte's Data

Brain Cipher: Spear phishing specialists say they have hacked the leading multinational professional services firm. Deloitte say otherwise.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

High Technology Crime Investigation Association (HTCIA)

High Technology Crime Investigation Association (HTCIA)

HTCIA was formed to provide education and collaboration to our global members for the prevention and investigation of high tech crimes.

Pyramid Computer

Pyramid Computer

Pyramid Computer provides custom enterprise solutions for Industrial PC, Imaging, Network, Security, POS, Indoor Positioning and Automation.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Jumpsec

Jumpsec

Jumpsec provides penetration testing, security assessments, social engineering testing, cyber incident response, training and consultancy services.

Risk Ident

Risk Ident

RISK IDENT specializes in supporting enterprises in identifying and preventing criminal activity like payment fraud, account takeovers and identity theft.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

NETRIO

NETRIO

If you are looking for a highly mature, exceptionally competent Managed Service Provider, NETRIO has solutions to keep your business running at warp speed with zero disruptions.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Sinergi Digital

Sinergi Digital

Sinergi Digital is a business unit of the Metrodata Group with a focus on providing ICT solution to help accelerating digital transformation.