News

2022-04-25

The Cyber Delusion Challenge For Small & Medium Businesses

With the increased sophistication of cybercrime tools, what can SMBs do to combat the mounting threats that they face? By John Davis

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-25

The Vital Importance Of Pen Testing

Penetration Testing is vital to protecting your organisation against attack and reassuring your employees, customers and regulatory authorities. 

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-04-20

Pegasus Spyware Used To Target British Prime Minister

Evidence found of surveillance software being present on devices associated with the British Prime Minister’s Office at 10 Downing Street.

2022-04-19

Software Industry Mergers and Acquisitions 2022

The software industry has seen M&A activity worth $160 billion in 2022 to date, notably including huge deals for acquisition of Citrix and Mandiant.

2022-04-20

Police Shut Down RaidForums Hackers

The notorious hacking marketplace, RaidForums, has been shut down and its infrastructure seized in a major Europol operation.

2022-04-20

Microsoft Removes Domains Used For Cyber Attacks On Ukraine

Fancy Bear: Microsoft has seized control of seven domains used by Russian threat actors for attacks that targeted digital access in Ukraine.

2022-05-02

EU Officials Targeted with Pegasus Spyware

Unprecedented Intrusion: Senior European Union officials, including the Justice Commissioner, were targeted with Pegasus spyware.

2022-04-20

Remote Access Scams Open The Door To Thieves

British users lost £50m in remote access scams where victims are tricked into handing over control of their computer or smartphone to criminals.

2022-04-21

Algorithms, Lies & Social Media

Achieving a more transparent and less manipulative online media may well be the defining political battle of the 21st century.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

International Association for Cryptologic Research (IACR)

International Association for Cryptologic Research (IACR)

(IACR is a non-profit scientific organization whose purpose is to further research in cryptology and related fields.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Taoglas

Taoglas

Taoglas Next Gen IoT Edge software provides a pay as you go platform for customers to connect, manage and maintain their edge devices in an efficient and secure way.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

Suresecure

Suresecure

Suresecure are a specialised consulting company providing Strategic IT security consulting, Managed Security Services, and Incident Response Management.

HackNotice

HackNotice

HackNotice Teams is an all-in-one encompassing tool that monitors threats within your organization, different vendors, and third parties whose services you use.

Vectra AI

Vectra AI

Vectra threat detection & response - see and stop threats across hybrid and multi-cloud enterprises.

Cycurion

Cycurion

Cycurion is a global leading provider of Network Communications and Information Technology Security Solutions.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.