News

2022-05-31

Twitter Fined $150m For Selling User Data

While Twitter had undertaken not to give personal information about users to advertisers, the social media company broke its promise. 

2022-05-31

No future For IoT Security Without Secure Access Service Edge (SASE)

Iot Security: SASE introduces a new architecture where networking & security functions are bundled in a cloud-delivered service. By Martin Giess

2022-05-30

Can A Cybercrime Convention For All Be Achieved?

International Rules: A new UN cybercrime treaty process is raising strong awareness about one of the biggest global challenges. By Joyce Hakmeh

2022-05-30

US Banks Hit By Russian Cyber Attacks

CISA Issues A Warning: US banks are currently under advanced and sustained cyber attack from Russian connected hackers.

2022-05-28

Fraud Online & On The Telephone

Courier Fraud: Criminals passing off as a bank, police officer or ISP are targeting vulnerable women to steal their cash and valuables.

2022-05-27

General Motors Hack Exposes Car Owner Information

Credentials Stuffing: Customer data exposed includes first and last names, email and home addresses, usernames and phone numbers.

2022-05-30

Responding To An Unintentional HIPAA Violation

Healthcare organisations face numerous challenges protecting patient data, not least compliance with stringent US regulations. By Narendra Sahoo

2022-05-26

Best Practices For Cyber Security Awareness Training

Employees are the easiest link for malicious people looking to access secure networks and harm. They need awareness training. By Charlie Svensson

2022-05-26

Intelligent Solutions: How Innovation Is Helping To Suppress Cyber Attacks

Powerful innovations in Quantum, AI, Biometrics and Password Management are helping defend against cyber threats. By Chester Avey

2022-05-25

A Phishing Attack That Delivers Three Forms Of Malware

Trojan Malware: Inserting malicious links into phishing emails allows attackers to harvest usernames, passwords & bank details from Windows users.

2022-05-25

How To Build A Successful Zero Trust Strategy For Data Analytics Users

Watch this webinar to hear why zero trust is one of the proven approaches for cloud access management.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

rPeople Staffing

rPeople Staffing

rPeople provides direct placement in all areas of your organization, including and specializing in Technical and Executive hiring.

Exclusive Networks

Exclusive Networks

Exclusive Networks accelerate market entry and growth for innovative cybersecurity, networking and infrastructure technologies.

National Cyber Directorate Israel

National Cyber Directorate Israel

The Israeli National Cyber Directorate provides incident handling services for civilian entities and critical infrastructures and works to increase national resilience against cyber threats.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

ESL Bangladesh

ESL Bangladesh

ESL is the Largest IT Infrastructure & Telecom Service Provider in Bangladesh.

Halcyon Knights

Halcyon Knights

Halcyon Knights is a specialist executive search and IT recruitment agency in the APAC region. Areas of specialisation include cybersecurity.

Innosphere Ventures

Innosphere Ventures

Innosphere Ventures is Colorado’s leading science and technology incubator, accelerating the success of high-impact startup and scaleup companies.

Open Raven

Open Raven

Open Raven is the cloud native data security platform that prevents breaches driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Fortiedge

Fortiedge

Fortiedge is an IT Security solution provider specializing in Cyber Security practices and solutions for our clients.

Great American Insurance Group

Great American Insurance Group

Great American's Cyber Risk Division offers cyber solutions for small and medium-sized businesses.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.

Quantum Bridge

Quantum Bridge

Our unbreakable key distribution technology ensures the highest level of protection for your critical infrastructure and sensitive data in an evolving digital landscape.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.