News

2022-04-28

Cyber Criminals Increasingly Focus On Mobile Devices

Mobile platforms supply an ever increasing number of distributed endpoints and their security is no longer an option for businesses. By Ian Porteous.

2022-04-28

Identity Access Management Essentials

Identity & Access Management (IAM) is a critical element of an organisation's IT infrastructure and its importance is growing. By Stefan Nilsson

2022-04-27

European Union Has Rules On Illegal Online Content

The EU Digital Services Act will give effect to the principle that what is illegal offline, should be illegal online, with very big penalties.

2022-04-27

Cyber Security Training Reduces Cyber Attacks

Take Action: Cyber criminals often choose to attack organisations with weak cyber training expertise. We recommned you GoCyber.

2022-04-27

Twitter, Free Speech & Disinformation

Elon Musk’s purchase of Twitter might mean the site will do even less to moderate extremism, hate speech, fake news and disinformation.

2022-04-26

Digital Experience Monitoring - The Future Of Remote & Hybrid Work

Digital Experience Management is the ideal strategy for measuring the impact of the digital experience on productivity. By Naveena Srinivas

2022-04-26

Cyber Security Weak Points That Business Leaders Should Know About

Security Threats Are't Going Away: Board members need to understand their risks from a business continuity and a cyber security standpoint.

2022-04-26

Iran Has Stopped A Large Scale Infrastructure Attack

Unamed cyber attackers were planning to exploit a security gap in the software most widely used by infrastructure organisations in Iran.

2022-04-26

Elon Musk's Deal To Buy Twitter

Twitter is in the final stages of negotiation for the innovative automotive & space billionaire to buy the social media platform. What's next?

2022-04-25

Business Leaders Have A Legal Liability When A Data Breach Occurs

Cyber security starts at the top, because if top management don't take cyber security seriously, neither will the front-line employees. 

2022-04-25

Half Of Phishing Emails Target LinkedIn Accounts

User Beware: The professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

SOTI

SOTI

SOTI is an industry leader in Enterprise Mobility Management (EMM).

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

EclecticIQ

EclecticIQ

EclecticIQ is a global provider of threat intelligence, hunting and response technology and services.

Optimal IdM

Optimal IdM

Optimal IdM is a leading global provider of identity management solutions and services.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Wayra UK

Wayra UK

Wayra UK, part of Telefónica Open Future, has been chosen to run a new cyber accelerator facility to help UK start-ups grow and take the lead in producing the next generation of cyber security systems

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

White Bullet

White Bullet

White Bullet’s risk profiling AI detects, dynamically scores and flags unsafe domains, apps and advertising.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

CERT.JE

CERT.JE

CERT.JE is responsible for promoting and improving the cyber resilience across the critical national infrastructure, business communities and citizens in Jersey.

Kompleye

Kompleye

Kompleye is a recognized cybersecurity and compliance audit organization that offer a comprehensive solution for different industries.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

ASMGi

ASMGi

ASMGi is a managed services, security and GRC solutions, and software development provider.

GeoComply

GeoComply

GeoComply provides fraud prevention and cybersecurity solutions that detect location fraud and help verify a user's true digital identity.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.