News

2024-01-31

The Importance Of Cloud Access Security In Today's Cyber Landscape

Cloud Access Security Broker solutions provide organizations with the necessary tools and capabilities to secure their cloud environments.

2024-01-31

Quantum Computing: The Growing Threat Of SNDL

Store Now & Decrypt Later: Advances in Quantum computing mean that any encrypted data that's already been stolen can no longer be protected.

2024-01-31

FinOps In Cybersecurity: Managing The Cost Of Security

FinOps is all about understanding the cost implications of different security measures & making informed decisions about where to allocate resources.

2024-01-30

AI Adoption: The Overlooked Existential Risk

Despite many fears, Generative A is being safely deployed across many sectors and will drive enormous long term value. By Adrian Joseph

2024-01-30

Britain's New Digital Markets Act Could Cost Business Billions

The updated Digital Markets Bill, intended to ensure fairer competition in the technology industry, may impose heavy costs on business & consumers.

2024-01-30

What Lessons Have We Learnt From Recent Ransomware Group Attacks?

No Room For Laxity: Whilst regulatory fines are computable, reputational loss and its longevity are impossible to quantify. By Jack Garnsey

2024-01-30

Deep Fake Images of Taylor Swift Taken Down

Explicit AI-generated images of Taylor Swift have been removed from X / Twitter in the latest example of the proliferation of fake pornography.

2024-01-29

Navigating Cloud-Native Application Security With CWPP

Cloud Workload Protection Platforms: A security solution that protects containerized environments & manages identities & access control effectively.

2024-01-29

Under-Performing Cyber Security Providers

The Financial Services Industry Has A Problem: Many organisations that outsource their cybersecurity lack confidence in the service provider.

2024-01-29

Cyber Security Education From Childhood Is Becoming Vital

Over 70% of children around the world have experienced at least one type of cyber threat online. They need education to protect themselves.

2024-01-27

To Increase Your Pay You Should Acquire AI Skills

Career Opportunities: Employers are willing to pay a 31% premium for IT workers with AI expertise and often they are offering six-figure salaries.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

Eustema

Eustema

Eustema designs and manages ICT solutions for medium and large organizations.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Carson & SAINT

Carson & SAINT

Carson & SAINT is an award-winning consulting firm with deep experience in cybersecurity technology, software, and management consulting.

Kivu Consulting

Kivu Consulting

Kivu Consulting combines technical and legal expertise to deliver data breach response, investigative, discovery and forensic solutions worldwide.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

InfoGuard

InfoGuard

InfoGuard is a leading Swiss company providing comprehensive cyber security and network solutions.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Evidence Talks Ltd

Evidence Talks Ltd

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Kocho

Kocho

Kocho (formerly TiG) is a provider of identity and access, cyber security, cloud transformation, and managed IT services.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

NMi Group

NMi Group

NMi Group is a global pioneer in mission-critical Testing, Inspection, Certification, and Calibration (TICC) services.