News

2024-11-12

Empowering Employees To Prevent Data Leaks

Process Over Top-Down Enforcement: Many workers are beginning to feel overwhelmed by complex security rules. By Anita Mavridis & Sue Musumeci

2024-11-12

Strengthen Software Supply Chain & Governance For Better AI System Cybersecurity

Its increasing use for sophisticated phishing emails and deep fake attacks makes AI security more important than ever. By Srikrishna Shankavaram

2024-11-11

The Human Impact Of Ransomware In Healthcare

Urgent action is needed to combat the cybersecurity trade-off which is putting patient’s health and wellbeing at risk. By Darren Williams

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-11-11

Ai-Da - The Robot Artist

Portrait Of Alan Turing: A painting by an AI robot of the eminent World War Two codebreaker mathematician has been sold for over $1m.

2024-11-11

Hackers Target Sensitive Corporate Data 

40GB Of Data Stolen: The French multinational energy & automation company Schneider Electric has suffered a severe attack.

2024-11-08

Testing APIs Against The OWASP LLM Top 10

Insufficiant Testing: Several popular GenAI applications have been found to be exposed to indirect prompt injection vulnerabilities. By Andy Mills

2024-11-08

NAKIVO Backup & Replication: The Best Solution For Business Data Backup

Explore the features and capabilities of NAKIVO Backup & Replication - the fast and efficient solution for business data backup and recovery. 

2024-11-07

Cybercrime & Trade Secrets

Navigating New IP Threats In A Digital World: As the value of IP continues to grow, protecting trade secrets is a big issue. By Randy Sadler

2024-11-07

The Importance Of Ensuring Domain Infrastructure Security

Domain names play an important role in protecting our digital infrastructure in more ways than one. Q&A Interview with Ram Mohan

2024-11-01

Canada Accuses India Of Using Spyware To Track Separatists

Canada's main spy agency says it has found evidence of the Indian government using illicit spyware to track & intercept Sikh separatists.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Vaddy

Vaddy

Vaddy provide an automatic web vulnerability scanner for DevOps that performs robust security checks to ensure that web app code is secure.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Forum Systems

Forum Systems

Forum Systems is a global leader in API Security Management with industry-certified, patented, and proven products deployed in the most rigorous and demanding customer environments.

EVOKE

EVOKE

EVOKE is an award-winning Digital Transformation company that partners with its clients to build digital workplace solutions for organizational challenges.

Acreto

Acreto

Acreto is an end-to-end security infrastructure that protects all your technologies with a single, simple cloud service.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

Fusion Cyber

Fusion Cyber

Fusion Cyber educates students in Zero Trust Risk Management, Defense, and Cyber Offense that lead to taking industry-accepted cybersecurity certifications.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Imprivata

Imprivata

Imprivata is the digital identity company for life- and mission-critical industries, redefining how organizations solve complex workflow, security, and compliance challenges.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.