News

2024-03-13

Gender Diversity In The Technology Sector

The Tide is Turning: British organisations are slowly starting to recognise the benefits of employing more women in the technology sector.

2024-03-01

Ransomware: The True Cost To Business

Paying Ransom Does Not Work: Organisations should really focus on detection & prevention tactics before a damaging attack happens.

2024-02-28

Harnessing Predictive Analytics In Cybersecurity

Proactive Cybersecurity: Harnessing the power of predictive analytics in cybersecurity is not an opportunity. It's an imperative. By Alexander Norell

2024-02-28

DMARC Email Validation: Cracking Down On Fraud

Google & Yahoo mail services are introducing changes starting soon that will make your inbox a safer place for both legitimate senders & recipients.

2024-02-26

Data Leak Exposes China’s Hackers For Hire 

Nation-State Hackers Exposed: I-Soon has abilities to breach foreign governments, infiltrate social media accounts & hack personal computers.

2024-02-24

Defending Against These Common Types Of Cyber Attack

Cyber crime will cost the global economy approximately $10.5 trillion annually by 2025. What, then, are the most common types of cyber attack?

2024-02-23

Cyber Insurance For Industrial Companies - Its Complex

Industrial firms face big challenges & complex processes to get cyber insurance cover, leaving many of them excluded. By Edgardo Moreno

2024-02-23

Cybersecurity, Volt Typhoon & The Grid

As IT becomes more and more a part of OT, the growing reliance of the grid on digital systems increases the possibility of cyberattacks.

2024-02-23

A European Cybercrime Breakthrough Is Only Half The Battle

The First Rule Of Cybercrime Is That No One Goes To Prison: Cybercrime is global in nature but criminal laws are intensely local. By Emily Taylor

2024-02-24

Major US Mobile Network Failure

The US had a lengthy cellular outage last week with thousands reporting connectivity issues. affecting AT&T, T Mobile, Verizon and other networks.

2024-02-26

AI Targeted Drones Are Not Working

Both Ukraine & Russia have deployed small military drones that use AI to identify and select potential targets, but with no measurable effect.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Apcon

Apcon

Apcon's mission is to provide valuable network insights that enable security and network professionals to monitor, secure and protect their data in both physical and virtual environments.

6cure

6cure

The 6cure Threat Protection solution eliminates malicious traffic to critical services in real time and protects against DDoS attacks.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

MyDocSafe

MyDocSafe

MyDocSafe is an all-in-one document security and e-sign software.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

UK Cyber Security Association (UKCSA)

UK Cyber Security Association (UKCSA)

The UK Cyber Security Association (UKCSA) is a membership organisation for individuals and organisations who actively work in the cyber security industry.

ESC - Enterprise Security Center

ESC - Enterprise Security Center

ESC is a system house specializing exclusively in IT security - Security Implementation & Optimization, Operations, Managed Security Services.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Core to Cloud

Core to Cloud

Core to Cloud provide consultancy and technical support for the planning and implementation of sustainable security strategies.

JanBask Training

JanBask Training

JanBask Training is a dynamic, highly professional, global online training provider committed to propelling the next generation of technology learners with a whole new way of training experience.