For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2024-11-01

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

AWS Webinar: Hear security experts break down myths and realities of next-generation firewalls, how to use them & how to boost your security posture.

2024-11-05

Social Media Algorithms & Their Effects [extract]

Algorithms analyse previous behaviour, using past interactions to predict and suggest content that aligns with individual user interests.

2024-11-05

Generating Competitive Advantage Through Compliance

Managing cyber risk is a powerful business enabler, helping businesses to become more efficient and more competitive. By James Eason

2024-11-05

Safeguarding Your Business: 10 Best Practices For Mobile Device Safety

Smartphones, tablets and laptops are essential for communication, data access & collaboration but are equally attractive targets for cyberattacks.

2024-11-04

Russian & Chines Affiliated Hackers Attack The Netherlands

Counter-Terrorism & Security: Hackers are focused on penetrating critical infrastructure to steal sensitive data and make preparations for sabotage.

2024-11-04

To Lead In AI, Governments Need To Invest In Large-Scale GPU Clusters

The US government needs to move fast to build new computing infrastructure if it is to keep pace with AI research & the related economic benefits.

2024-11-04

The US Has A New AI Strategy 

As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

2024-11-01

Canada Accuses India Of Using Spyware To Track Separatists

Canada's main spy agency says it has has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.

2024-11-01

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

2024-11-01

Cyber Security Teams Feel The Pressure 

Understaffed, Overworked & Underfunded: Cyber security teams are also suffering from major skills gaps and a shortage of well- trained people.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Armor

Armor

Armor provide managed cloud security solutions for public, private, hybrid or on-premise cloud environments.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Alertot

Alertot

Hackers attack minutes after a new vulnerability is published. Alertot helps to decrease exposure time in organizations by notifying new issues when they are disclosed.

Rubrik

Rubrik

Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

Nextgen Group

Nextgen Group

Nextgen Group is a pioneering technology services group with innovative and unique services across enterprise software, cloud, data management, and cybersecurity solutions.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

ID North

ID North

ID North is a Nordic service provider offering identity security to its customers by providing world class expertise and best-in-class solutions and services.

Narf Industries

Narf Industries

Narf Industries are a small group of reverse engineers, vulnerability researchers and tool developers that specialize in tailored solutions for government and large enterprises.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.