News

2024-06-03

Shiny Hunters Attack Santander Bank

Hackers responsible for the massive breach at Ticketmaster have stolen the confidential information of 30 million Santander employees & customers.

2024-05-30

Email Encryption: What It Is & How It Works

Email Encryption: An essential tool that keeps users' sensitive information safe from threats like hacking, fraud, data breaches and identity theft.

2024-05-31

Online Fraud - Police Agencies Recover Stolen $Millions

Operation Endgame: Europol & the US Dept of Justice make arrests and recover stolen funds in separate operations against botnet & malware thieves.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-30

Massive Breach At Ticketmaster

1.3 Terabytes Of Data Stolen: Ticketmaster has been hit by a cyber attack by the 'Shiny Hunters'. Sensitive customer data is for sale for $500k.

2024-05-30

Five AI-driven Features to Enhance Payment Gateway Security

Incorporating AI-driven features into payment gateway security frameworks is essential for staying ahead of sophisticated cyber threats.

2024-05-29

Hackers Exploit GitHub & FileZilla To Deliver Malware

Fake GitHub accounts & repositories resembling real software programs, but filled with malware, designed to access computers and steal data.

2024-05-29

Google AI Makes Embarrassing Errors

Google has attracted derision after its proprietary AI tool, Overview, produced inaccurate, in some cases bizarre, answers to user questions.

2024-05-28

Minimizing The Impact Of Human Factors In Cybersecurity Errors

The Human Factor Is A Liability: Cybersecurity is never one and done. This is a continuous effort and continuous effort always requires consistency.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

Medigate

Medigate

Medigate is a dedicated medical device security platform protecting all of the connected medical devices on health care provider networks.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Innovative Solutions (IS)

Innovative Solutions (IS)

Innovative Solutions is a specialized professional services company delivering Information Security products and solutions for Saudi Arabia and the Gulf region.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Attack Research

Attack Research

We go far beyond standard tools and scripted tests. Find out if your network or technology can stand real-world and dedicated attackers.

RFA

RFA

RFA is a unique IT, financial cloud and managed cyber-security provider to the financial services and alternative investment sectors.

Cytellix

Cytellix

Cytellix is an industry-standards-based, managed cybersecurity service provider, specializing in proactive behavioral analytics and situational awareness of an organization’s cyber posture.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Nexum

Nexum

Nexum takes a comprehensive approach to security, from detecting and preventing network threats, to equipping you with the information, tools and training you need to effectively manage IT risk.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

Team Secure

Team Secure

Team Secure provide Enterprise-grade Cyber Security consultancy, managed security services and cyber security staffing services.

Cyber Security Partners (CSP)

Cyber Security Partners (CSP)

Cyber Security Partners specialise in the provision of Cyber Security Consultancy, Data Protection and Certification and Compliance services.

Dataminr

Dataminr

Dataminr Pulse helps organizations strengthen business resilience with AI-powered, real-time risk and event discovery—and the integrated tools to manage responses.

GitLab

GitLab

GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate and build software.

Interlynk

Interlynk

Interlynk's #SBOM and # VEX-powered platform automates and continuously monitors first-party and vendor software supply chains and helps meet #FDA, #CRA, #GSA, and #DoD compliance obligations.