News

2021-10-05

Data Is Your Most Valuable Asset. How Are You Protecting Yours?

Backup: Keeping a copy of data is not sufficient, you need an effective system that can protect and support it, everywhere. By Colin Tankard

2021-10-05

Facebook, WhatsApp & Instagram Suffer Massive Outage

Facebook's social media platform, WhatsApp and Instagram all simultaneously went down for six hours overnight but are now back up and running.

2021-10-04

Students Warned Of Tax Refund Frauds

In the past year almost one million people reported fraud attempts to HMRC and over 900,000 students with part time jobs could be at risk.

2021-10-04

EU Competitions: Cyber Security Enthusiasts Invited to Enter

Two international team competitions this month organised to promote awarenes among new potential entrants to the cyber security profession. 

2021-10-04

Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud

Thursday 21 October | SANS & AWS Marketplace will share how organizations can use SASE to enhance security for modern infrastructures.

2021-10-01

US Cyber Security Chiefs Support Mandatory Incident Reporting

The Director of CISA tells US Senators to enforce mandatory cyber incident reporting for federal agencies, contractors and many private firms.

2021-09-30

Incident Response In The AWS Cloud

All AWS users must have an appreciation of security incident response procedures and how to react to security issues. By Gilad David Mayaan

2021-09-30

Connected Cars - What Does Your Car Know About You?

Personal Details: Name, phone number & address - are the most common data that car makers collect, but much more data is becoming available.

2021-09-30

Treason: Top Cyber Security Executive Arrested

The CEO of top Russian cyber security company Group IB, has been arrested on suspicion of state treason, punishable by up to 20 years in jail.

2021-09-29

Cyber Security Priorities For The New Normal

New Normal: CISOs have the simultaneous challenges of building cyber preparedness, minimising risks & ensuring business continuity.

2021-09-28

Europol Breaks Open Mafia Cyber Crime Group

The Mafia group were using hackers specialised in latest-generation phishing and in the use of social-engineering techniques to steal $12million.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

Stott & May

Stott & May

Stott & May is a specialist cyber security recruitment agency.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Trustless Computing Association (TCA)

Trustless Computing Association (TCA)

TCA is is a non-profit organization promoting the creation and wide availability of IT and AI technologies that are radically more secure and accountable than today’s state of the art.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Crashtest Security

Crashtest Security

Crashtest Security is a cyber security company that helps digital companies to continuously create secure software with the help of automated vulnerability assessments.

SmartCyber

SmartCyber

SmartCyber is a company specializing in custom IT projects and Cybersecurity.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Flotek

Flotek

Flotek is an IT & Comms service provider delivering SMEs with trusted, innovative and cost effective cloud technology, with confidence, clarity and clout.

Opal Security

Opal Security

Opal is an identity and access management platform that offers a consolidated view and control of your whole ecosystem from on-prem to cloud and SaaS.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.