News

2024-02-02

Reducing The Risk Of Weak Links With Consolidation

Less Complexity, Less Risk: Cyber security measures are only as strong as the weakest link and consolidation is a smart move. By Manuel Sanchez

2024-01-31

The Importance Of Cloud Access Security In Today's Cyber Landscape

Cloud Access Security Broker solutions provide organizations with the necessary tools and capabilities to secure their cloud environments.

2024-01-31

Quantum Computing: The Growing Threat Of SNDL

Store Now & Decrypt Later: Advances in Quantum computing mean that any encrypted data that's already been stolen can no longer be protected.

2024-01-31

FinOps In Cybersecurity: Managing The Cost Of Security

FinOps is all about understanding the cost implications of different security measures & making informed decisions about where to allocate resources.

2024-01-30

AI Adoption: The Overlooked Existential Risk

Despite many fears, Generative A is being safely deployed across many sectors and will drive enormous long term value. By Adrian Joseph

2024-01-30

Britain's New Digital Markets Act Could Cost Business Billions

The updated Digital Markets Bill, intended to ensure fairer competition in the technology industry, may impose heavy costs on business & consumers.

2024-01-30

What Lessons Have We Learnt From Recent Ransomware Group Attacks?

No Room For Laxity: Whilst regulatory fines are computable, reputational loss and its longevity are impossible to quantify. By Jack Garnsey

2024-01-30

Deep Fake Images of Taylor Swift Taken Down

Explicit AI-generated images of Taylor Swift have been removed from X / Twitter in the latest example of the proliferation of fake pornography.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

2024-01-29

Under-Performing Cyber Security Providers

The Financial Services Industry Has A Problem: Many organisations that outsource their cybersecurity lack confidence in the service provider.

2024-01-29

Cyber Security Education From Childhood Is Becoming Vital

Over 70% of children around the world have experienced at least one type of cyber threat online. They need education to protect themselves.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyberwatch

Cyberwatch

Cyberwatch is a Vulnerability Scanner & Fixer software that helps you to detect and fix the vulnerabilities of your Information System.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

FaceFirst

FaceFirst

FaceFirst provide face recognition technology solutions to detect and deter real time threats,

BioCatch

BioCatch

BioCatch uses behavioral biometrics for fraud prevention and detection. Continuous authentication for web and mobile applications to prevent new account fraud.

CryptoCodex

CryptoCodex

Cryptocodex has developed Counter-Fight, the most advanced, yet simple to implement, counterfeit detection system.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

SEC Consult

SEC Consult

SEC Consult is a leading European consultancy for application security services and information security.

Secnology

Secnology

Secnology is dedicated to developing and providing the most powerful and user friendly event analysis and security management solution.

Digiserve

Digiserve

Digiserve by Telkom Indonesia is an end-to-end managed solutions provider committed to empowering enterprises in Indonesia.

DivvyCloud

DivvyCloud

DivvyCloud protects your cloud and container environments from misconfigurations, policy violations, threats, and IAM challenges.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

Amazon Web Services (AWS)

Amazon Web Services (AWS)

Amazon Web Services is the world’s most comprehensive and broadly adopted cloud platform, offering fully featured services from data centers globally.

Entro Security

Entro Security

Entro is the first holistic secrets security platform that detects, safeguards, and enriches with context your secrets across code, vaults, chats, and platforms.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.