News

2023-03-02

The Office Workplace ln The Hybrid World

Remote Teamwork In Multiple Locations & Settings: What should a modern office look like in today's world of hybrid work. By Samir Desai

2023-02-28

The Virtual & Real Cybersecurity Threats In The Metaverse 

Virtual World: The future of the metaverse as a usable interactive environment is doomed if we fail to properly secure it. By Spencer Starkey

2023-02-28

Securing Valuable Data

Crypto-segmentation is a vital tool in creating a security model that truly supports the need to safeguard valuable data assets. By Simon Pamplin

2023-03-01

Webinar: Firewall-as-a-service (FWaaS)

Discover the benefits of firewall-as-a-service (FWaaS) in a secure access service edge (SASE) model: WATCH NOW

2023-03-03

Digital ID Cards For Everyone In Britain

Sir Tony Blair and Lord Hague are recommending adoption of universal ID cards in an effort to use technology to transform the British economy.

2023-03-02

An Apocalyptic Cyber Event

Warning: The World Economic Forum Global Security Outlook Report 2023 predicts a “catastrophic cyber event" is on the way in the "near future".

2023-03-01

Calculating The Ransom Demand On The Victim’s Insurance

Informed Extortion: The ransomware group HardBit offers to set its ransom demands in relation to the victim organisation's insurance cover.

2023-02-28

Hackers Have Stolen GoDaddy's Source Code

GoDaddy has revealed that hackers gained access to its servers to install malware, with the potential to extort many of its hosting customers.

2023-03-10

Artificial Intelligence Today - How AI Works

Artificial Intelligence is becoming the main component of important emerging technologies like Big Data, Robotics and the Internet of Things.

2023-02-27

Australia’s Victoria Leads On National Cyber Strategy

Centre Of Excellence: Victoria is Australia’s leading cyber security hub, with a thriving tech base that is developing global security solutions.

2023-02-27

Start Thinking Like A Hacker

Curiosity Aggression & Persistence: To get inside the mind of a hacker, you need to think like a hacker and this is known as "white hat" hacking.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Hack in the Box Security Conference (HitBSecConf)

Hack in the Box Security Conference (HitBSecConf)

HITBSecConf is a platform for the discussion and dissemination of next generation computer security issues. Our events feature two days of training and a two-day multi-track conference

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Galois

Galois

Galois specializes in the research and development of new technologies that solve the most difficult problems in computer science.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

Quantstamp

Quantstamp

Quantstamp are experts in Smart Contract Security Audits. We provide verification that your decentralized system works as intended.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

GB Group (GBG)

GB Group (GBG)

GBG is a global technology specialist in fraud, location and identity data intelligence.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

Persistent Systems

Persistent Systems

Persistent Systems are a trusted Digital Engineering and Enterprise Modernization partner, combining deep technical expertise and industry experience to help our clients.

Cyber Law Consulting

Cyber Law Consulting

Cyber Law Consulting is a Dynamic full service legal firm which offers complete services for Cyber Law, cyberlaw, Internet Law, Data Protection Act, Cyber Security, IPR, Drafting.

Forward Networks

Forward Networks

Forward Networks - transforming networks to be more reliable, agile, and secure.

TELUS

TELUS

TELUS provide Canadian businesses with the services and solutions they need to securely thrive in a digital world. Partner with a cybersecurity leader you can rely on.