For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2023-02-15

UK Cyber Week - London - 4 and 5 April 2023

UK Cyber Week Launch Event: Set to Close the Cyber Knowledge Gap Between Cybersecurity and Business Communities. FREE TICKET

2023-04-01

Simplifying Workflows With Centralized Tools & Automation    

From Mundane To Marvellous: A cohesive ecosystem of sysadmin tools that work seamlessly together, rather than a clutter of stand-alone tools.

2023-03-31

The Inevitable Rise Of Artificial Intelligence

Industry leaders are calling for a six-month halt to training new AI systems to give the industry time to assess the risks. By Winlo & Cambolin

2023-03-31

Understanding The Incident Response Lifecycle

Best practices help organizations enhance their incident response capabilities, ensuring a more effective response to cybersecurity incidents.

2023-03-31

Imminent: Cybesecurity Regulations For US Financial Services

Don't Wait: Firms should test their vulnerability management programs, introduce a patch program and do penetration testing now. By Simon Eyre

2023-03-30

AI - The Most Important Tech Advance In Decades

Bill Gates says Artificial Intelligence is as fundamental as the creation of the microprocessor, the PC, the Internet and the mobile phone.

2023-03-30

Bitbucket Backup Methods

What if you lose access to your crucial Bitbucket data? It can lead to business disruption, and more or less significant data loss.

2023-03-30

The Cybersecurity Report Threat To Railways

Ransomware attacks are an increasingly significant cyber threat facing the transport sector in the EU and railways are the prime target.

2023-03-29

World Backup Day 

Securing DevOps: Don't neglect to backup the types of data that are often overlooked, but the loss of which can lead to serious consequences.

2023-03-29

Cyber Security Budgets Are Misspent

Over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.

2023-03-29

What Is Email Spoofing & How to Protect Your Organization

Fraud: There are several measures that organizations can take to protect themselves against email spoofing. By Gilad David Mayaan.

2023-03-28

ChatGPT Language Model Risks

AI chatbots and Large Language Models (LLMs) present a rising security threat, the British National Cyber Security Agency has warned.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Owl Cyber Defense Solutions

Owl Cyber Defense Solutions

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

ZM CIRT

ZM CIRT

ZM CIRT is the national Computer Incident Response Team for Zambia.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Clym

Clym

Clym is the data privacy platform that helps organisations meet their data protection obligations. Cookies, Consent, Requests, Policies and more are all managed in a secure and adaptive application.

AimBrain

AimBrain

AimBrain tools detect and prevent fraud, faster and more accurately than ever before.

Identifi Global Recruitment

Identifi Global Recruitment

Identifi Global is one of the UK's leading Cyber Security & IT Recruitment specialists.

Scout Ventures

Scout Ventures

Scout Ventures is an early stage venture capital firm that is making the world a better, safer place by cultivating standout frontier technologies.

Bugbank

Bugbank

Bugbank (aka Vulnerability Bank) is a leading SaaS platform for internet security services in China.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.