News

2023-04-24

Facebook Users In Line For $725m Payout

Cambridge Analytica Data Privacy Settlement: Facebook users could receive a share of a $multimillion settlement in a successful privacy lawsuit.

2023-05-02

Build and Implement an Effective Endpoint Detection and Response Strategy

Webinar: Thursday, May 11 | Discover how you can implement endpoint detection and response (EDR) tools into your security strategy.

2023-04-20

What Is A Credential Stuffing Attack & How To Protect Your Organization

Credential stuffing is a type of attack that relies on the fact that many people use the same usernames & passwords across multiple accounts.

2023-04-28

The Evolution Of Russian Cyber Warfare

Future Warfare: Intelligence leaks provide an insight into Russian cyberwar objectives & potential long-term threats to Western organisations.

2023-04-21

An Increasingly Diverse Attack Landscape

Covert Methods: SonicWall's research report details a more diversified cyber attack landscape and shifting patterns of threat actor strategies.

2023-04-19

British Cyber Security Agency Issues An Alert

Russian Hackers Target Critical Infrastructure: Russia seeks to "disrupt or destroy" Britain's critical infrastructure, Cabinet Office warns.

2023-04-26

Sharing Threat Intelligence

Cyber attacks have increased in frequency & sophistication, presenting significant challenges for organisations in defending their data & systems.

2023-04-19

Online Safety Bill UK: WhatsApp, Encryption & The Implications For Privacy

The Legislation Focuses On Child Protection: So why are WhatsApp and other organisations opposing the proposed new laws? By Andrew Parsons

2023-04-26

Selling Digital Insecurity

Offensive cyber capabilities pose a significant threat to international security. Such capabilities can also cause significant damage.

2023-04-25

As A Business Leader, You Must Manage Cyber Risk 

Cyber attacks are a key risk for boards and any director seeking to add value for corporate stakeholders should appreciate the growing jeopardy.

2023-04-18

Soft Cell Hackers Have New Targets

An international hacking campaign targeting global telecommunications companies to extract personal data of persons of interest to China.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Computer Laboratory - University of Cambridge

Computer Laboratory - University of Cambridge

Computer security has been among the Laboratory’s research interests for many years, along with related topics such as cryptology

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Eclypsium

Eclypsium

Eclypsium protects organizations from the foundation of their computing infrastructure upward, controlling the risk and stopping threats inside firmware of laptops, servers, and networks.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Abacus Group

Abacus Group

Abacus Group is a global IT services firm for alternative investment firms, providing an enterprise technology platform specifically designed to meet the unique needs of financial services.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

DNS Research Federation (DNSRF)

DNS Research Federation (DNSRF)

DNSRF's mission is to advance the understanding of the Domain Name System's impact on cybersecurity, policy and technical standards.

P3M Works

P3M Works

P3M Works delivers Cyber Security and Digital Transformation projects across both private and public sector clients.

NopalCyber

NopalCyber

NopalCyber makes cybersecurity manageable, affordable, reliable, and powerful for companies that need to be resilient and compliant.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.