News

2024-10-30

Trump Campaign A Target For Attacks From China

Salt Typhoon: A Chinese cyber espionage group is identified as responsible for attacks on telephone networks used by both US Presidential candidates.

2024-10-30

Making Insider Threats A Year Round Priority

The Danger Within: The biggest risk to an organization's cyber security comes from the inside - and that needs to be a top priority all year round.

2024-10-30

How Do The UK Cyber Security & Resilience Bill & The EU's NIS2 Compare?

Business operating in both regimes can expect to have to meet both UK & EU regulations and so will need to seek harmonization. by Innes Muir

2024-10-25

What Security Teams Need To Know About The EU’s NIS 2 Directive

Act Now: The NIS 2 Directive brings significant changes and increased obligations for organizations across the EU & beyond. By Graham Rance

2024-10-29

GenAI Is The Biggest Cyber Security Risk

A Growing Arms Race: Nearly half of security professionals think Artificial Intelligence is the most significant security risk to their organization. 

2024-10-29

AI-Driven Air Defense System Takes Aim At Drones

Drone Swarms: Defenders can neutralize drone threats simply by tapping a mobile device, simplifying decision-making & improving flexibility.

2024-10-27

Teach Your Children About Safer Cyber Security

Internet safety and cyber security are vital parts of technology education. Adults need to ensure youngsters can navigate the digital world safely.

2024-10-26

Getting A Return On Cybersecurity Investment

Can Businesses Really Put a Price on Prevention? A deep dive on investing in cybersecurity tools. By Frank Horneberg & Simon Newman

2024-10-28

Dark Data Helps Boost Business

Unveiling Hidden Insights: Dark data represents a vast reservoir of untapped potential for businesses across industries. By Jacques du Preez

2024-10-28

Zero Trust Architecture: The Key To Securing Hybrid Environments 

Securing hybrid environments, which blend on-premise, public cloud and private cloud resources, presents a complex challenge. By Asher Benbenisty

2024-11-01

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Help Net Security

Help Net Security

Help Net Security has been a prime resource for information security news and insight since 1998.

National Defense Industry Association (NDIA)

National Defense Industry Association (NDIA)

The National Defense Industrial Association Cyber Division contributes to US national security by promoting interaction between the cyber defense industry, government and military.

Cyber Security Capital (CS^)

Cyber Security Capital (CS^)

Cyber Security Capital is a consultancy helping to mobilise and empower individuals, corporate leaders and entrepreneurs in cyber security.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

Cyber Resilient Energy Delivery Consortium (CREDC)

Cyber Resilient Energy Delivery Consortium (CREDC)

CREDC performs multidisciplinary R&D in support of the Energy Sector Control Systems Working Group’s Roadmap of resilient Energy Delivery Systems (EDS).

LATRO Services

LATRO Services

LATRO Services is a complete solution provider to discover, locate, and eliminate telecom fraud.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Cyemptive Technologies

Cyemptive Technologies

Cyemptive's CyberSlice technology preempts and remove threats before they take hold, in seconds, compared to other’s hours, days, weeks and even months.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

BreachLock

BreachLock

Breachlock delivers the most comprehensive Penetration Testing as a Service (PtaaS) powered by Certified Hackers and AI.

NetTech

NetTech

NetTech’s Managed CyberSecurity and Compliance/HIPAA services are designed to help your company prevent security breaches and quickly remediate events if they do happen to occur.

Prelude

Prelude

Prelude offer the first autonomous platform built to attack, defend and train critical assets through continuous red-teaming.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.

Harmonic Security

Harmonic Security

Harmonic Security helps companies to adopt Generative AI without risking the security and privacy of their data.