For continued FREE access to Articles and Directory Listings please LOGIN to your Account or SIGN UP.
2025-01-15

The International Race To Lead In Quantum Technology 

Quantum computers will create extraordinary opportunities for those organisations and nations able to develop and take advantage of them.

2025-01-17

Resident Biden’s Final Cyber Security Executive Order  

Parting Shot: It Is unclear how much of Joe Biden’s last-minute directive to strengthen US national cyber security will be embraced by Donald Trump.

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

2025-01-15

British Government Will Ban Payment For Ransom Attacks 

Deterring Cyber Crime: The intention is to make public sector & infrastructure organisations less attractive targets for ransomware gangs.

2025-01-15

Understanding The Importance of Kernel-Level Security

Is Your ICS Kernel Vulnerable?: The kernel is at the core of any industrial operating system - protecting its security is essential. By Tim Reilly

2025-01-14

Still The International Cyber Super Power

The USA remains the most capable cyber state, due to significant investments & clear political direction for the pursuit of national cyber power.

2025-01-14

Cyber Attack On Slovakia’s Land Registry

Meet The Neighbours: Ukraine is blamed for a crippling ransom attack on a government agency, described as the largest in the history of Slovakia.

2025-01-13

The British Government’s AI Action Plan 

The new AI regime in Britain could facilitate a “sweet spot”, attracting the sort of investment and innovation intended to boost economic growth. 

2025-01-11

British Online Safety Act Takes Effect

Online platforms have three months to assess the risk of their users encountering illegal content and implement safety measures or face prosecution.

2025-01-11

CISA Finds Serious Problems In Oracle & Mitel Systems

Known Exploited Vulnerabilities: Thousands of network servers found to be exposed to unauthorised admin access and data extraction.

2025-01-10

Microsoft Will Spend $80b On AI-Enabled Data Centers

Microsoft has revealed plans to spend as much as $80 billion this year on the construction of data centers that can handle AI workloads.

2025-01-10

Q3 2024: Over Half A Million Cyber Attacks On Critical Infrastructure

The attack surface has never been wider, threat actors are broadening their horizons, while ransomware groups are becoming more sophisticated.

Subscribe!

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Granite Partners

Granite Partners

Granite is a cloud service for the development of business risk management, cyber security and privacy and occupational safety and health.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Spamhaus

Spamhaus

Spamhaus is the world leader in supplying realtime highly accurate threat intelligence to the Internet's major networks.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Alpha Mountain AI (alphaMountain)

Alpha Mountain AI (alphaMountain)

alphaMountain provides up-to-date domain and IP intelligence for cybersecurity investigational and protection platforms.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Gem Security

Gem Security

Gem is on a mission to help security operations evolve into the cloud era, and stop cloud threats before they become incidents.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

Communications Fraud Control Association (CFCA)

Communications Fraud Control Association (CFCA)

CFCA is the premier International Association for fraud risk management, fraud prevention and profitability control.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.