News

2024-07-26

CrowdStrike’s Cyber Outage Will Cost $Billions

With regulatory penalties and many costly lawsuits in preparation, CrowdStrike's investors face $billions in fines, legal fees and lost revenue. 

2024-07-26

Wiz Rejects Google's $23b Acquisition Offer

Wiz has decided not to go forward with an unprecedented deal to be acquired by Google's parent and will remain an independent company.

2024-07-26

How Small Businesses Can Develop Cyber Resilience

To stay competitive, small businesses need to strengthen cyber resilience, secure their customer data & protect their IT systems. By Jochen Haller

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-25

Israel-Hamas Conflict: The Escalation Of Cyberwarfare

Malware, Hacktivism & Disinformation: The ramifications of the Middle East cyberwar will impact organizations around the world. By Craig Watt

2024-07-24

Progress In Deepfake Detection

Identity Swaps: Researchers at Nanjing University have classified deepfakes Into four main types, each one posing a different threat.

2024-07-24

Beware The Ghost Stories Of Cyber Space

Presented with false & distorted information, magnified from multiple sources, US voters should ask these three questions. By Ron Marks

2024-07-23

The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies

For CISOs, this event is a sharp reminder of the fundamental risks associated with over-reliance on a single supplier, especially in the cloud.

2024-07-23

Proposed British Digital Information & Smart Data Bill

Harnessing The Power of Data: An important move for data protection, particularly for reforms around Digital Verification Service. By David Varney

2024-07-22

Student Who Sold Cyber Attack Software Is Jailed

DDoS For Sale: A student in Scotland gets a conviction for creating and distributing a mobile app he designed to disrupt corporate websites.

2024-07-19

Semiconductor Manufacturing Companies Stocks Fall

The soaring share prices of the makers of advanced semiconductors has crashed following statements from Donald Trump & the US government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

A10 Networks

A10 Networks

A10 Networks is a leader in application networking, helping organizations of all sizes to accelerate, optimize and secure their applications.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Golden Frog

Golden Frog

Golden Frog is a Virtual Private Network services provider offering secure encrypted access to the internet.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Kape Technologies

Kape Technologies

Kape Technologies is a cybersecurity company focused on helping consumers around the world have a better digital experience with greater privacy and protection.

Qrypt

Qrypt

Qrypt has developed the only cryptographic solution capable of securing information indefinitely with mathematical proof as evidence.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

VISO Cyber Security

VISO Cyber Security

VISO provide Cyber Security Consulting and CISO as a Service to companies who need to augment their leadership teams with information security expertise.

CV-Library

CV-Library

Start your job search with 216,931 live UK vacancies on award-winning CV-Library. Register your CV and find local jobs near you today!

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Cyber Grant

Cyber Grant

Cyber Grant excel in designing cybersecurity solutions for data protection. Our approach and vision, centered on ease-of-use, establish us as a benchmark in the industry for safeguarding information.