News

2024-04-06

Beware Scammers Imitating Bank Websites

Consumer advice service Which? has found thousands of lookalike websites that imitate British banks, set up to defraud unwary customers.

2024-04-03

The Changing Role Of The CISO 

Strategic Shift: CISOs are increasingly business aware, indicating a significant evolution from traditional roles to strategic business enablers.

2024-03-28

Universities Are Stepping Up Training For More Front-Line Workers

Cyber-Defenders Are In Demand: Pace University is stepping up to train students to identify, defend & mitigate cyber-attacks. By Dr. Jonathan Hill

2024-04-02

Half Of British SMEs Have Lost Vital Data

Almost half (48%) of small and medium-sized businesses in the UK have lost or lost access to company or customer data in the last five years.

2024-04-01

Two Sides Of AI In The Industrial Internet of Things

Dual Perspectives: The synergy of AI and IoT will unlock a new level of creativity & efficiency, redefining industrial operations. By Antoinette Hodes

2024-04-02

What Will The NIS2 Directive Mean For Smaller Organisations?

Raising The Security Bar: NIS2 expands the scope of entities covered and EU states must adopt the legislation by October. By Bernard Montel

2024-04-02

Data Compliance When Using MS Copilot

Implementing Microsoft Copilot: You’ve heard the hype, everyone wants it, but how do you implement it without causing harm? By Mike Bellido

2024-04-02

The Dynamic Influence Of AI On Business Cybersecurity

Cybersecurity professionals have a responsibility to maintain control over AI & establish clear guidelines over its use. By Jason Kemmerer

2024-04-02

Prioritising Prevention Is Better Than Paying Ransom

Wake Up: By working together and staying vigilant, we can protect ourselves from the damaging effects of ransomware. By Brandon Rochat

2024-04-02

Dark Data Helps Boost Business

Unveiling Hidden Insights: The untapped potential of dark data can have a transformative impact on business. By Jacques du Preez

2024-03-29

British Parliament Debates Chinese Cyber Attacks 

Prime Minister Rishi Sunak has said China presents an “epoch-defining challenge” arising from cyber attacks on MPs and the Electoral Commission.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Fortinet

Fortinet

Fortinet is a provider of network security systems. Our products provide protection against dynamic security threats while simplifying the IT security infrastructure.

ARC Advisory Group

ARC Advisory Group

ARC is a leading technology research and advisory firm with expertise in both information technologies (IT) and operational technologies (OT)

NordForsk

NordForsk

NordForsk facilitates and provides funding for Nordic research cooperation and research infrastructure. Project areas include digitalisation and digital security.

Flexera

Flexera

Flexera is reimagining the way software is bought, sold, managed and secured.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Internetwork Defense (IND)

Internetwork Defense (IND)

Internetwork Defense is a premier provider of Information Security Training and Business Consulting Services in the Mid-Atlantic region.

Newberry Group

Newberry Group

The Newberry Group provides comprehensive IT services and solutions that optimize operations, minimize risk and deliver measurable business value.

Zercurity

Zercurity

Zercurity is on a mission to build the ultimate cybersecurity operations platform for businesses. To help protect against a growing number of internal and external threats.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.

Lupovis

Lupovis

Lupovis is an AI-based deception solution that deploys active decoys turning your network from a flock of sheep to a pack of wolves where the hunter becomes the hunted.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.