News

2022-06-29

Cyber Security Tools For Your Small Business

Hackers love targeting small businesses and investing in cyber security tools can reduce your business' vulnerability and save valuable resources. 

2022-06-27

Russia Escalates Spying On Ukraine’s Allies

Russian state-backed hackers have been identified as conducting espionage against 128 organisations in 42 countries allied to Ukraine.

2022-06-27

US Bank Loses Critical Data Of Over A Million Customers - Again

Flagstar Bank has disclosed a second major data breach where criminals got access to the personal information of 1.5 million customers.

2022-06-27

Murder Enabled By Social Media

Instagram & Snapchat: British schoolchildren lured a 13-year-old to a park where he was stabbed to death were motivated by images on social media.

2022-06-21

Putin Lashes Out After His Speech Is Delayed By DDoS

President Putin launched a tirade against Western Governments after his conference speech was delayed by an hour due to a cyber attack.

2022-07-06

Global Government Spending On IT To Grow 5%

Global government IT spending is forecast to be $565.7 billion in 2022, an increase of 5% from 2021, and cloud solutions will take a bigger share.

2022-07-14

Coming Soon: Your Digital Twin

A digital twin is an exact replica of something in the physical world, but with a unique mission to test and improve the real-life version.

2022-07-14

Cyber Security Training For Employees & Employers

Go Cyber: A different training approach that has a lasting, very positive impact and can significantly improve your organisation’s cyber security.

2022-07-14

Canada Considers Mandatory Reporting Of Cyber Attacks

Growing International Threats: The federal government is planning to compel Canadian businesses and companies to report cyber attacks.

2022-07-06

Channel 4 TV Launches New Cyber Thriller

The Online Frontline: Channel 4 has launched a highly anticipated new six-part cyber thriller The Undeclared War, set in a dramatised GCHQ.

2022-07-11

Bluetooth Devices Can Covertly Track Mobile Users

A Significant Privacy Risk: Your smartphone & laptop give off unique Bluetooth radio signals that can be identified and used to track your location. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

NopSec

NopSec

NopSec provides automated IT security control measurement and risk remediation solutions to help businesses protect their IT environments from security breaches.

Olfeo

Olfeo

Olfeo is a content filtering software vendor. Our proxy and filtering solution helps our customers to manage, monitor and secure their Internet traffic.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

CounterFind

CounterFind

CounterFind is turnkey technology that allows brands to find and remove counterfeit and infringing merchandise from online marketplaces and social media sites.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

AKS iQ

AKS iQ

AKS iQ leads the RegTech sector with AI, automating regulatory compliance in the banking industry and ensuring paperless TBML and CFT adherence in finance.

CyberAI Group

CyberAI Group

CyberAI's mission is to pioneer the evolution of the cybersecurity landscape globally, by strategically acquiring and elevating IT consulting firms into leaders of cybersecurity innovation.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.