News

2022-12-01

Defending Against North Korea's Cyber Threats

The US and South Korea are to cooperate on mutual defense measures to combat the cybercrime capabilities of North Korea's state sponsored hackers.

2022-11-30

No Slack In The System

Attack Vector: Internal communication channels are an increasing cybersecurity risk that criminals are using to devastating effect.  By David Nelson

2022-11-29

EU Parliament Website Knocked Offline

Killnet Responds: The EU Parliament experienced a DDos attack following a resolution condemning Russia for state-sponsored terror.

2022-11-30

Sharing Deepfakes To Be Made Illegal In Britain

The proposed new law will allow prosecution for recording and sharing intimate images without the need to prove an intention to cause distress.

2022-11-29

It’s Well Past 230 For The US Communications Decency Act

US Legislation introduced 26 years ago that was designed to protect & promote growth of the Internet is well past its 'Sell By' date. By Ronald Marks.

2022-11-28

Hidden In Plain Sight

Control system cyber incidents are more numerous & damaging than you might expect - more than 17 million resulting in 34,000 deaths. By Joe Weiss

2022-11-25

Five Ways Executives Can Optimize Cyber Security Spending

The Right Tools & People: Just pouring money into cyber security does not automatically result in increased preparedness. By Lee Rossey

2022-11-25

Navigating The Evolving Threat Landscape

Top Two Priorities: Organizations must adopt a culture of becoming operationally resilient to survive the evolving threat landscape. By Tom Goodwin

2022-11-25

Shifting Left In Enterprise Cloud Security

Speed Versus Safety: Companies need to invest in preventative measures to safeguard their cloud estates against cyber attacks. By Stuart Green

2022-11-23

Simplicity In Complexity: The Key to Successful Threat Exposure Management

Continuous Threat Exposure Management: CTEM is the key that unlocks the convoluted situation of threat handling, bringing order to chaos.

2022-11-23

How to Combat Common Information & Collaboration Security Threats

Cyber Security Enables Business: Every single business is a target and attacks are only going to become more subtle & more frequent. By Onur Özen

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CCN-CERT

CCN-CERT

CCN-CERT is the Spanish national government computer security incident response centre.

Digital Hands

Digital Hands

Digital Hands is an award-winning managed security services provider.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Riddle&Code

Riddle&Code

Riddle&Code is a product-led services company specializing in onboarding industries to Web3. The team's mission is to provide a trusted connection between the digital and physical worlds.

BLUECYFORCE

BLUECYFORCE

BLUECYFORCE is the leading professional training and cyber defense training organization in France.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

World Informatix Cyber Security (WICS)

World Informatix Cyber Security (WICS)

World Informatix Cyber Security provides a range of cyber security services to protect valuable information assets to global business and governments.

Quantum Armor

Quantum Armor

Quantum Armor is a next-gen cyber security monitoring platform that allows you to continuously stay aware of your security posture, and proactively spot trends, vulnerabilities and potential attacks.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Magna5

Magna5

Magna5 is a managed IT service provider focusing in network and server monitoring, backup and disaster recovery, cybersecurity, help desk and SD-WAN.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

Cypfer

Cypfer

CYPFER is a global market leader in ransomware post-breach remediation and cyber-attack first response.