News

2023-12-28

Albanian Parliament & Telecoms Operator Attacked

Iranian Hackers Claim Responsibility: Albania’s Parliament and a national telecommunications company targeted by cyber attacks.

2024-01-02

The New York Times Intends To Sue Microsoft  & OpenAI

Critical Test Case: The US newspaper is suing OpenAI & Microsoft for copyright infringement, claiming their AI models were built without permission.

2024-01-01

Cyber Security Jobs In 2024

If you’re looking for a rewarding career, cyber security might be your ideal choice. Qualified professionals are in high demand and the pay is good. 

2023-12-29

Guidelines For The ‘Catastrophic Risks’ Of AI

Preparedness Framework: OpenAI has taken the initiative and published its own guidelines for assessing the risks of Artificial Intelligence models.

2023-12-29

Students Should Learn About Phishing 

Young adults aged 18 - 24 are increasingly targeted by online criminals and are far more likely to fall victim to fraud than older age groups.

2023-12-28

European Union Charges Twitter X With Breaking The Law

Illegal Content & Disinformation: The EU is taking regulatory action against Twitter X under its recently implemented Digital Services Act.

2023-12-28

Hackers Attack Iranian Fuel Infrastructure

Predatory Sparrow: An Israeli hacking group has claimed responsibility for a widespread attack disrupting petrol distribution across Iran.

2023-12-27

The Next Generation Of Cloud Security

Cloud-Native Application Protection Platform: A package of security tools that helps safeguard your data & applications in the cloud.

2023-12-27

New Generative AI Tools Coming In 2024

Transformative Technology Is Growing Fast: Generative AI is expected to quickly become more widely integrated into workplace technology.

2023-12-21

Artificial Intelligence Is Good For The Legal Profession

Law firms with strong regulatory practices are well positioned to ride the wave of advisory & compliance work the EU's AI regulations will create.

2023-12-20

Russia Steps Up Cyberwar Against Ukraine

As the military conflict reaches a grinding stalemate, Russia is increasingly focused on cyber attacks against Ukraine's infrastructure & allies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

inBay Technologies

inBay Technologies

inBay Technologies' idQ Trust as a Service (TaaS) is a unique and innovative SaaS that eliminates the need for user names and passwords.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Vuntie

Vuntie

Vuntie blend European craftsmanship, performance and open-source technology to deliver cybersecurity services including penetration testing, incident response, training and consultancy.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Fingent

Fingent

Fingent develops strategic software solutions for businesses across the globe in areas including Network Security, Infrastructure Security, Application Security, Risk and Compliance.

KBR

KBR

To help governments and other agencies to combat cyber threats, KBR is safeguarding their most valuable systems with sophisticated tools, hardware and training.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Digitpol

Digitpol

Digitpol’s Cyber Crime Investigation experts investigate hacking incidents, ransomware, extortion and conduct security audits and IT upgrades.

7layers

7layers

7layers has established itself as one of the world’s leading test house groups for mobile devices and the growing number of wireless devices, modules and chipsets.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

iSPIRAL IT Solutions

iSPIRAL IT Solutions

iSPIRAL is a leading regulatory technology software provider delivering state-of-art AML, KYC, Risk and Compliance solutions.

Technoware Solutions

Technoware Solutions

Technoware Solutions is a global company committed to helping entities navigate the digital waters of modernizing their system processes in an ever changing cybersecurity landscape.