News

2023-10-26

Cybersecurity Awareness Month Turns 20

October is the 20th Cybersecurity Awareness Month: We heard from eight experts on current industry trends & what they see in the future.

2023-10-26

Big Medical Diagnostic Company Exposed To Data Breach

Millions Of Sensitive Patient Records Exposed: Security researcher Jeremiah Fowler discovered an unprotected database of 12m records.

2023-10-26

How Businesses Can Avoid Firewall Vulnerabilities

Managed Firewall Services: Without help, thinly spread cybersecurity teams risk failing to protect valuable company data. By Erik Nordquist

2023-10-25

A Microchip To Reshape Artificial Intelligence

NorthPole: IBM has a new microchip design with the potential to power the next generation of AI, enabling smarter, network-independent devices.

2023-10-25

How Cybercriminals Could Be Infiltrating Your Supply Chain

Island Hopping: Infiltrating a single, weaker target to exploit existing credentials and gain access into larger enterprises. By Stuart Hodkinson

2023-10-25

Intelligence Chiefs Accuse China Of IP Theft & Online Deception

Cognitive Warfare: China understands the power of social media to shape perceptions of events. Also, how to carry out online espionage.

2023-10-24

The Latest Trends In Email Threats

Callback Phishing & Malware Delivered Via Google Drive: Email threats remain one of the major sources of trouble for cybersecurity teams.

2023-10-25

The Information War In Gaza & Israel

Disinformation & Hate Speech: In the absence of reliable news on events in Gaza, social media has been playing a big part in filling the gaps.

2023-10-24

Navigating The Data Privacy Maze

How do you comply with ever changing data protection regulations & are they a major impediment to cross-border business? By Katie Simmonds

2023-10-23

A Perfect Storm Of Cyber Threats

AI, Hacktivism & Weaponised Deepfakes: The familiar threats are evolving as criminals modify their methods to damage organisations worldwide.

2023-10-23

Iranian State Sponsored Hackers On The Attack

Undetected Malware: Capable of intercepting MS Exchange to compromise incoming email, as well as upload & download files from the infected host.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Protectimus

Protectimus

Affordable two factor authentication (2FA) provider. Protect your data from theft with multi factor authentication service from Protectimus.

TCPWave

TCPWave

TCPWave IPAM is the world’s first acclaimed DNS/DHCP management software to pass the most stringent Information security tests.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.