News

2024-08-27

Prioritizing Data Security In The Age Of Generative AI

The integration of generative AI brings a wave of innovation, but it also introduces new cybersecurity risks to protecting your data. By Samer Diya

2024-08-27

China & Russia In Technology Collaboration

Western sanctions have directly affected Russia’s technology supply chain, forcing it find critical technology like computer chips elsewhere.

2024-08-24

Chinese Attacks On Russian Government Agencies 

CloudSorcerer: Someone is attacking Russian government and infrastructure using a sophisticated tool associated with Chinese hackers.

2024-08-23

Predictions For The Fourth Industrial Revolution [extract]

Industry 4.0: The biggest surprise might be the unexpected ways that humanity innovates in response to the challenges & opportunities of the age.

2024-08-22

Predictions For The Fourth Industrial Revolution

Industry 4.0: The biggest surprise might be the unexpected ways that humanity innovates in response to the challenges & opportunities of the age.

2024-08-22

Judge Uses ChatGPT As A Source For Court Verdict

A lower court judge in the Netherlands asked an AI chatbot about the average life span of a solar panels, using the answer it generated in his verdict. 

2024-08-22

How Can You Scan Your Mac For Existing Malware?

Macs have a great reputation, but users need to take steps to identify potentially dangerous malware that might steal their identity & delete files.

2024-08-23

WhatsApp Is A Vehicle For Illegal Content

Encrypted Child Sexual Abuse Imagery: A conflict between the need for enforceable child protection measures and rights to user privacy.

2024-08-22

Threat Intelligence: Most Prevalent Malware Rankings

The Usual Suspects: The top Malware families, exploited Vulnerabilities, mobile Malwares, Ransomware groups and attacked industry sectors.

2024-08-20

APT42: Iranian Hackers At Work

State-sponsored hackers from Iran are busy ramping up targeted phishing campaigns and fake news operations to undermine the US elections.

2024-08-20

North Korean IT Contractor Fraud

Laptop Farming: North Korean IT workers were logging on to work from locations in China, while appearing to be contractors located in the US.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

INSUREtrust

INSUREtrust

INSUREtrust is a pioneer in the industry, inventing the concept of cyber insurance.

Graphus

Graphus

Graphus provides a simple, powerful, automated solution that eliminates 99% of social engineering and spear phishing attacks against G Suite business Gmail users.

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

Webtotem

Webtotem

Webtotem's mission is to prevent the global epidemic of website infection and provide every website owner with basic security rights.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Accedian

Accedian

Accedian is a leader in performance analytics and end user experience solutions, dedicated to providing our customers with the ability to assure their digital infrastructure.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.

Nordic Defender

Nordic Defender

Nordic Defender is the first crowd-powered modern cybersecurity solution provider in the Nordic region.

DeepTempo

DeepTempo

At DeepTempo, we build AI models and related software that protect enterprises and service providers from sophisticated cyber threats.