News

2025-01-21

A New Era Of Digital Resilience For The EU

DORA Takes Effect: As cyber threats grow in complexity and with a growing reliance on digital infrastructure, DORA is a vital step. By Jamie Moles

2025-01-21

How SASE Fits Into The Modern Cybersecurity Landscape

Attackers Are Faster, Smarter & Relentless: Phishing emails, ransomware and sophisticated attacks are the norm. Enter SASE.

2025-01-21

Ukrainian Hackers Attack Russian Financial Services

550TB Of Data Destroyed: Russia's leading online trading platform, Roseltorg, has been attacked by a pro-Ukraine hacking group, Yellow Drift.

2025-01-20

Remote Deletion Of Malware Enforced On Thousands Of Computers 

The US Justice Dept. has confirmed completion of an operation ordering removal of PlugX Chinese malware infecting over 4,000 computers.  

2025-01-20

Data Broker Discloses A Major Breach Of App User Data

Misappropriated Access Key: Hacked data appears to have originated in thousands of smartphone apps, including Tinder, Grindr and Candy Crush.

2025-01-20

EU Wants To Strengthen Cyber Defense In Healthcare  

The European Commission has a comprehensive plan to fortify the cyber security of hospitals & healthcare providers across the EU.

2025-01-17

Thermodynamic Computing - A New Computer Architecture

A Third Way: Thermodynamic Computing aims to make use of the inherent noise and fluctuations of matter to power advanced computations. 

2025-01-17

British Regulator Will Investigate Google

Market Dominanace: Google is being investigated by the UK Competition & Markets Authority over its web search & advertising practices.

2025-01-21

TikTok Reprieved By Trump

President Trump Stops US TikTok Ban: TikTok will "most likely" be handed a 90-day reprieve just a day before the company said it would "go dark". 

2025-01-20

Salt Typhoon - The Chinese Telecom Hack

What's Next?: Their attacks have impressed by the skill, persistence and ability of Salt Typhoon hackers to embed in computer networks.

2025-01-17

Tackling Cyber Threats In The Public Sector

Phishing-Resistance Is Key: Public sector organisations need to have the necessary tools to protect against cyber threats. By Niall McConachie

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

IASME Consortium

IASME Consortium

IASME is one of five companies appointed as Accreditation Bodies for assessing and certifying against the UK Government's Cyber Essentials Scheme.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Radar Cyber Security

Radar Cyber Security

Radar Cyber Security is the only European supplier of Managed Detection & Response who provides its services based on inhouse developed technology.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

CalCom

CalCom

CalCom Hardening Solution (CHS) for Microsoft OMS is a security baseline-hardening solution designed to address the needs of IT operations and security teams.

Versa Networks

Versa Networks

Versa is a software-defined networking vendor providing an end-to-end solution that both simplifies and secures the WAN/branch office network.

Fraugster

Fraugster

Fraugster provides the most precise anti-fraud solution for e-commerce businesses.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

DataEndure

DataEndure

DataEndure helps companies build digital resilience so that their critical information assets are protected and available to the right people, at the right time.

VLC Solutions

VLC Solutions

VLC Solutions is an independent solutions and technology service provider offering Cloud Services, Cybersecurity, ERP Services, Network Management Services, and Compliance Solutions.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.