News

2023-05-15

Higher Education: Lessons In Cybersecurity

With a large potential attack surface and big  rewards for hackers, it's easy to see why universities are high on the hit list. By Chris Boyle

2023-05-15

Effective Enterprise Vulnerability Management & Compliance

ManageEngine Vulnerability Manager Plus: The comprehensive and effective enterprise vulnerability management and compliance solution 

2023-05-15

How Cybercriminals Profit From Your Personal Information

Protect Your Data Online: Multiple websites on the dark web are used for buying user information from cyber criminals - you should take precautions.

2023-05-12

Businesses Must Prepare For 90-Day Certificates

Google’s 90-Day Certs Are Coming: With enough time to prepare & automation readily available, there is no excuse to be caught out. By Tim Callan

2023-05-15

Which Sectors Are Top Targets For Cyber Crime?

Banks, Healthcare & Food Retailers: The latest threat intelligence from Blackberry found 60% of all attacks targeting these three key industries.

2023-05-12

What Is The Difference Between Phishing, Smishing & Vishing? 

An Internet user falls victim to cybercrime every 37 seconds: The more we understand scams, the better equipped we are to avoid becoming victims. 

2023-05-11

What The Latest Cybersecurity Trends Mean For Your SME 

Prevention Is Better Than Cure: Employee awareness, a protected domain name and strong authentication protocols can help manage risk.

2023-05-10

NSA Warning: China Is Stealing AI Technology

The US National Security Agency tells US technology companies to be aware of Chinese attempts to steal their Artificial Intelligence technology.

2023-05-10

Ransomware Attack Hits US Shipyard

The shipyard building the US Navy’s Littoral Combat Ship & Constellation-class guided-missile frigate has suffered a ransomware attack.

2023-05-10

Open Source Software In The Cloud

Researchers have linked the significant use of open source software to an increased need for high levels of vigilance by users. 

2023-05-10

Smart Gun Uses Facial Recognition Technology

James Bond's Pistol: A gun that can only be fired after verifying the shooter’s identity uses facial recognition and fingerprint technology.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

Spire Solutions

Spire Solutions

Spire Solutions is the Middle East & Africa region’s leading cybersecurity solution provider and value-added distributor (VAD).

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

Digital Management (DMI)

Digital Management (DMI)

DMI is a provider of mobile enterprise, business intelligence and cybersecurity services.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Securix

Securix

SECURIX AG delivers holistic IT security solutions that are tailored to the specific challenges and requirements of your company.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Threat Con

Threat Con

Threat Con is a one of its kind event in Nepal, a series of annual international security conventions similar to the famous Black Hat and DEF CON conferences.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

Blockfence

Blockfence

Blockfence are a seasoned crew versed in enterprise-grade cybersecurity and crypto, on a mission to collaboratively shape the future of Web3 security.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.