News

2024-11-04

The US Has A New AI Strategy 

As the Biden Presidency fades, the White House has issued a comprehensive new plan to harness Artificial Intelligence for national security.

2024-11-04

Russian Hackers Attack British Local Government 

A campaign of attacks on local councils is thought to be one part of Russia’s response to the UK’s growing involvement in the Ukraine war.

2024-10-31

The Developer’s Guide To Preventing Data Leaks & Breaches In Software

With the level of cyber threats so advanced, any weak spots in the code may result in exposed sensitive data & significant financial losses.

2024-11-03

X Is A Vehicle For Political Propaganda

Critics claim the platform is being used to promote politically motivated messages, including conspiracy theories, which are essentially propaganda.

2024-10-29

Google Urges Windows Users To Update Chrome Amid New Security Threats

Urgent Alert: When you keep your software updated it makes you safer online, improves your experience, and protects your important data.

2024-11-01

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

AWS Webinar: Hear security experts break down myths and realities of next-generation firewalls, how to use them & how to boost your security posture.

2024-11-01

Are Businesses Adopting A ‘Titanic Mindset’ To Data Recovery?

Sinking Feeling: One in five UK companies test their data recovery systems just once a year. Only 5% say they test monthly. By Stephen Young

2024-10-31

Preparing IT Teams For The Next AI Wave

The growing importance of AI has created a compelling reason for IT departments to address risk and compliance with renewed urgency.

2024-11-01

Cyber Security Teams Feel The Pressure 

Understaffed, Overworked & Underfunded: Cyber security teams are also suffering from major skills gaps and a shortage of well- trained people.

2024-10-31

2024 US Presidential Election Cyber Intrusion: Part 5 - Cybercrime Threats

USA 2024 Elections: With the polls even, what is the potential for collaboration between Nation State Actors & Cybercrime Groups? By Craig Watt ​​​​​​​

2024-10-31

What Industrial Organisations Can Learn From Nation-State Cyber Attacks

Risk Management: Often conceived without cybersecurity in mind, many industrial devices lack basic security measures and controls. By Edgardo Moreno

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

SAASPASS

SAASPASS

SAASPASS is a full-stack identity and access management solution, a single product which allows you to manage all your digital and physical access needs securely and conveniently.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

iHLS Startups Accelerator

iHLS Startups Accelerator

iHLS Accelerator is the first startup accelerator in the world in the security and homeland security field.

North American International Cyber Summit

North American International Cyber Summit

The North American International Cyber Summit brings together experts from around the globe to provide timely content and address a variety of cybersecurity issues impacting the world.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

OrbiSky Systems

OrbiSky Systems

OrbiSky Systems is a British tech startup specializing in data management and cybersecurity solutions.

Securily

Securily

Securily offers the ultimate solution for small to medium-sized businesses, blending cutting-edge AI with expert human insight to deliver the world’s easiest and most effective pentesting experience.

Merkle Science

Merkle Science

Merkle Science provides next generation risk mitigation, compliance and forensics for crypto-native businesses, DeFi participants, financial institutions & government agencies.

NetAlly

NetAlly

NetAlly network test solutions help engineers and technicians better deploy, manage, maintain, and secure today’s complex wired and wireless networks.

Thero6

Thero6

Thero6 develop dynamic financial analysis algorithms that help prevent coin collapses and theft of cryptocurrency funds by identifying the transaction absolutely throughout the chain.