News

2024-10-26

Online Killer Sentenced To Life In Jail

Sextortion: Cruel and degrading abuse led to the suicide of one child and the pitiless exploitation of thousands of others, from 3,000 miles away.

2024-10-25

2024 US Presidential Election Cyber Intrusion: Part 4 - Rising Hacktivist Threats

USA 2024 Elections: As the polls narrow, Hacktivists acting on behalf of both Russia & Palestine are intensifying their operations. By Craig Watt

2024-10-25

BRICS Summit: Russia's Foreign Ministry Attacked

Raining On Putin's Parade: Foreign Ministry was hit by a severe cyber attack, that coincided with a high profile BRICS summit in Kazan.

2024-10-25

Is The British Government Doing Enough To Combat Cyberattacks Against Critical Infrastructure?

With economic pressures mounting, the need to modernise outdated IT systems and make smarter security investments is crucial. By Dan Lattimer

2024-10-25

Building Secure Workflows: Using LCNC Platforms For Automating Cybersecurity Tasks

Protecting sensitive data is critical, with increasing pressure on security teams. That's where low-code/no-code (LCNC) platforms come in.

2024-10-18

Four Reasons To Migrate Your Business To The Cloud

A Sound Migration Strategy: Many more companies are adopting cloud computing as a core part of their operations. Here are the reasons why.

2024-10-17

Cybersecurity Education: Preparing the Next Generation of Cyber Defenders 

The online threat environment is worsening and stakeholders must partner and ensure more students enroll in cybersecurity courses.

2024-10-23

The Flawed Reality Of Artificial Intelligence

There is a growing realisation that AI is just another technology tool, with fundamental flaws of which we must be careful. By Ron Marks

2024-10-24

The Financial Impact Of Cybercrime

A CFO's Nightmare: Many organizations continue to underestimate the financial consequences of a breach. By John Mc Loughlin

2024-10-23

Private Equity Firms Should Make Cybersecurity Diligence A Priority

PE firms hold a wealth of sensitive information and cybersecurity is as important as “Quality of Earnings” for new acquisitions. By Chris Snyder

2024-10-22

How Can Cloud Risk Management Elevate Your Cybersecurity Posture?

With cloud computing, cybercrime has become more sophisticated, with unique risks like misconfigurations & insider threats. By Narendra Sahoo

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Synack

Synack

Synack provides a hacker-powered intelligence platform that uncovers security vulnerabilities that often remain undetected by traditional pen testers and scanners.

The Cyber Security Expert

The Cyber Security Expert

The Cyber Security Expert delivers cyber security consultancy, website and cloud security monitoring services, and specialist training services.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Concordium

Concordium

Concordium aims to build the world’s leading open-source, permissionless, and decentralized blockchain with built-in user identity at the protocol level.

VIBE Cybersecurity International

VIBE Cybersecurity International

VIBE’s certificate-less authenticated encryption enables scalable, flexible key exchange, and other advanced cryptographic functions using identity-based elliptic curve cryptosystems (ECC).

SecureThings

SecureThings

SecureThings focus is to provide guidance and technology to secure connected vehicles in order to build end-to-end security for the automotive industry.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.

XpertDPO

XpertDPO

XpertDPO provides data security, governance, risk and compliance, GDPR and ISO consultancy to public and private sector organisations.

OSP Cyber Academy

OSP Cyber Academy

OSP Cyber Academy are a managed service provider of cyber, information security and data protection training.

Saffron Networks

Saffron Networks

Saffron Networks is an ISO-certified company. We assure our clients of reliable solutions, specifically with the Security landscape and Enterprise Networking.

PixelQA

PixelQA

Are you looking for a security testing company to cross-check whether your software or mobile app has a possible security threat or not?

Aura Information Security

Aura Information Security

Aura Information Security consists of a team of highly-skilled and renowned information security professionals spanning Australia and New Zealand.

Hacker School

Hacker School

Hacker School offers technology motivated training programs that provide Cyber Security Certifications and Courses.