News

2020-11-04

Who Do You Trust With Your Personal Data?

People don’t completely trust social media with their personal data, although most Americans trust social media more than they trust the government.

2020-11-04

Webinar: How to enhance SOC efficiency for the AWS Cloud

Learn how AWS customers use automation and integrated threat intelligence to increase efficiency and scale their cloud security operations center.

2020-11-04

‘Robin Hood' Hackers Donate Stolen Money

The Darkside cybercrime group have extorted millions of dollars from ransomware attacks and now they want to "make the world a better place".

2020-11-03

US Invests Big In Space Force Cyber Security

US Space Command will dramatically increase the size of its cybersecurity team and are planning to add an additional thousand new personnel.

2020-11-03

2020 - Business Cyber Readiness

Cyber losses have risen nearly six-fold worldwide in the past year, with the Financial Services and Energy sectors most badly hit, says top insurer.

2020-11-03

Covid Vaccine-Maker Suffers Cyber Attacks

Pharmaceutical company Dr Reddy's, which is developing a Russian Covid-19 vaccine, has been hit by a series of serious cyber attacks.

2020-11-03

New Software Makes Data From Multiple Sources Readable

Using advanced geospatial intelligence, the software enables rapid discovery, exploitation, and dissemination of mission-critical geospatial data.

2020-11-03

Securing AI In Military Systems

Military robots will in the future incorporate AI that could make them capable of undertaking missions on their own. They must be immune to hackers.

2020-11-02

California & Florida Voter Websites Vulnerable To Hackers

Despite a warning, election officials might hesitate to take defensive measures so close to US Election day, for fear of losing voters' confidence.

2020-11-02

Cyber Spying Laws Are Changing

Important legal rulings in Britain and the USA show how important it is for business to keep up with and understand national IT & data security laws.

2020-10-30

Five Things Management Must Know About Cyber Security

Cyber threats advance more quickly than many organisations can keep up with. It has never been more important for business leaders to take action.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

Arista Networks

Arista Networks

Arista Networks is an industry leader in data-driven, client to cloud networking for large data center, campus and routing environments.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Nethemba

Nethemba

Nethemba provide pentesting and security audits for networks and web applications. Other services include digital forensics, training and consultancy.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

HYAS Infosec

HYAS Infosec

HYAS is a highly skilled information security firm developing the next generation of information security technology.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange (CPX)

Cybersecure Policy Exchange is a new initiative dedicated to advancing effective and innovative public policy in cybersecurity and digital privacy.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Center for Information Security Awareness (CFISA)

Center for Information Security Awareness (CFISA)

CFISA was formed by a group of academics, security and fraud experts to explore ways to increase security awareness among audiences, including consumers, employees, businesses and law enforcement.

HYCU

HYCU

HYCU was born of the need to simplify data protection and provide equivalent levels of backup and recovery support across on premises, public cloud, and SaaS workloads.