News

2023-01-10

Five Data Security Trends Organisations Must Deal With

In 2023 business challenges of all kinds are growing more difficult to identify and solve. Data protection is one of them. By Florian Malecki

2023-01-06

British Spy Chief Says War In Ukraine Is Changing Intelligence Gathering

Cyberwar: Ransomware, phishing and DDoS attacks are just a few of the many weapons that states are now using in geopolitical conflicts.

2023-01-09

Spying On Mobile Phone Calls

EarSpy: Smartphone manufacturers’ efforts to improve audio in their devices has led to new vulnerabilities, including unprotected earspeakers.

2023-01-09

Cybersecurity: Prepare For The Year Ahead

Back-to-Basics: Cybersecurity threats and regulation will evolve in the next year, yet many aspects will remain the same. By Simon Eyre 

2023-01-09

Web Browser Attacks & How To Combat Them

The web browser has become the biggest attack surface available to threat actors, who are actively leveraging and exploiting it. By Jonathan Lee

2023-01-09

Why We Should Worry About A War On Cybercrime

Critical Infrastructure: Cyber attacks are transitioning from being an issue of enterprise security to one of risk to public safety. By Will Dixon

2023-01-06

PAM, IAM, Or Both?

Useful But Different: Identity & Access Management (IAM) and Privileged Access Management (PAM) are not the same thing. By Colin Tankard

2023-01-06

EU Fines Meta $416m

Targeted Advertising: Ireland's Data Commissioner rules that Meta used peoples' data for adverts on Facebook and Instagram unlawfully.

2023-01-04

Multi-Factor Authentication Is No Shortcut To Cyber Resilience

Persistence Pays Off For Hackers: There's more to cyber resilience than MFA and broader technological & cultural changes are needed. By Adrian Odds

2023-01-03

Security Risks In 5G Mobile

Insecure By Design: 5G network slicing offers a widespread threat that includes potential weak points in policy, standards & supply chains.

2023-01-03

Biden Signs Quantum Cyber Security Act

Q Day: The law is designed to secure US government systems & data against the fast approaching threat of quantum-enabled data breaches.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Navista

Navista

Navista's hardware and software modules are especially designed to ease the deployment of secure networks.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Copper Horse Solutions

Copper Horse Solutions

Copper Horse specialises in mobile and IoT security, engineering solutions throughout the product lifecycle from requirements to product security investigations.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Nouveau

Nouveau

Nouveau Solutions is a specialist IT managed services company with a strategic focus on delivering cloud, infrastructure, compliance, network and security solutions.

BeDefended

BeDefended

BeDefended is an Italian company operating in IT Security and specialized in Cloud and Application Security with years of experience in penetration testing, consulting, training, and research.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

DC Two

DC Two

DC Two are a locally operated and supported Australian data centre, offering a suite of vertically integrated services covering every part of the data centre and cloud technology stack.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Yokai

Yokai

Yokai is a secure, distributed platform for data communication with enhanced security features tailored for classified environments such as finance, defence, healthcare, cybersecurity, and more.

CrashPlan

CrashPlan

CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup.