News

2023-09-22

Exploring How Generative AI Is Contributing To Cybersecurity Threats & Risks

Generative AI is transforming businesses, while simultaneously posing significant risks and dangers in the hands of hackers. By Farwa Sajjad

2023-09-21

Australian Government Suffers A Widespread Ransom Attack

Prolific ransomware group ALPHV hacked a law firm providing services to numerous government agencies, facilitating a wave of secondary attacks.

2023-09-20

Chinese Hackers Have Been Reading US Government Emails

An advanced Chinese spying campaign that involved breaches of Government & Legislature emails went undetected for months.

2023-09-20

Enterprise Cybersecurity Today: A Vast Landscape To Secure

The trends towards remote working, online shopping & banking have multiplied the number of endpoints that need protection. By Richard Yew

2023-09-20

The Worst Places To Connect To Public Wi-Fi

If your employees use public Wi-Fi networks, there is a high chance of malware infection. How can you protect both your people and your business?

2023-09-19

Why DNS Protection Should Be A Crucial Part In Building Cyber Defense

The Domain Name System can be a route for common cyber attacks, including DDoS, Hijacjking & MitM. All of which can have serious consequences.

2023-09-18

Navigating Priorities: Cloud vs Cyber For SMEs

In joining the widespread migration to Cloud Technology, SMEs must weigh the benefits against potential security and privacy risks. By Mark Allen

2023-09-18

The US Space Force Needs Help

Multitasking: The US Space Force urgently needs more skilled personnel to protect the military satellite fleet and operate its weapons systems.

2023-09-18

Dealing With Security Incidents In The Enterprise Sector 

Data Security Is The Top Priority: There are important steps businesses can take to combat ransomware & other malware attacks By Dirk Schrader

2023-09-19

The Slots Fall Silent

Update: Casinos in Las Vegas and other US locations have been held to ransom, with every area of business affected, from reservations to gaming.

2023-09-15

Another British Police Force Leaks Confidential Data

Supply Chain Hack: Greater Manchester Police officer details including name badges, ranks, photos & serial numbers may have been stolen.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

National Trading Standards eCrime Team (NTSeCT)

National Trading Standards eCrime Team (NTSeCT)

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

GuardiCore

GuardiCore

GuardiCore is an innovator in internal data center security and breach detection and is transforming security inside data centers and clouds.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

Netography

Netography

Netography provides a scalable and reliable platform for detection & remediation of cyber threats found on your network.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Alea Consulting

Alea Consulting

Alea Consulting is a global risk mitigation and investigative consulting firm, which helps organizations reduce reputation and operational concerns.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Privasee

Privasee

Make GDPR compliance simple with Privasee. Our software makes it easy to protect your data and ensure you’re compliant with the new regulations.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Cyber Brain Academy

Cyber Brain Academy

At Cyber Brain Academy, our mission is to provide high-quality IT certification training for the cyber security workforce.