News

2022-09-12

The Top 4 Cyber Threats - Is Your Business Protected?

Is it possible for businesses to really be protected? Absolutely – if organisations give cyber security the attention it deserves. By Keiron Holyome

2022-09-12

Cyber Crime Against Individuals

It's Personal: Cyber crime continues to rise in scale and complexity, affecting essential services & businesses, as well as many private individuals.

2022-09-09

(ISC)² Makes Cyber Security Careers More Widely Accessible

Achieving Career Goals: (ISC)² Candidates is an innovative new professional development path for individuals seeking a career in cyber security.

2022-09-08

Locking Down Cyber Security

Managing The Basics: Educating employees and partnering with the right cyber security technology providers will empower them to lock criminals out.

2022-09-07

The Quantum Internet Could Be Immune To Cyber Attack

Researchers at Eindhoven University of Technology are developing technology capable of delivering a fast and unhackable quantum Internet. 

2022-09-07

VPN Configuration: Understanding DNS Leaks & How to Prevent Them

VPNs are a great way to keep your browsing activity private, but you need to ensure you choose one that offers privacy protection. By Idrees Shafiq

2022-09-07

CIO & CISO Visions Leadership Summit - 9th to 11th October

Leadership Summit: Dedicated to IT and information security leaders; delivering the exact content, insight, connections & rewards you need.

2022-09-07

How To Prepare For A Cyber Crisis

Crisis preparedness is about minimising the consequences of an attack as quickly as possible & maintaining business continuity. By Jo De Vliegher

2022-09-06

Google Issues A Warning To Gmail Users

Google’s Threat Analysis Team is warning users of its Gmail service of a hacking exploit that has left some users exposed for over a year. 

2022-09-06

US Government Will Invest $15 Billion In National Cyber Security

2023 will be a good year for approved vendors as the US government goes large on defence & research spending on national cyber security.

2022-09-05

DMS Alerts Should Be Key To Organisations’ Security Orchestration

Document & Email Management System: DMS is an essential element in any organization's cyber security strategy. By Manuel Sanchez

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

National Cyber Security Centre (NCSC) - United Kingdom

National Cyber Security Centre (NCSC) - United Kingdom

The NCSC acts as a bridge between industry and government, providing a unified source of advice, guidance and support on cyber security, including the management of cyber security incidents.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Ilex International

Ilex International

Ilex International is a European software vendor which specialises in Identity & Access Management solutions.

Sqreen

Sqreen

Sqreen is a web application security monitoring and protection solution helping companies protect their apps and users from attacks.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

QOMPLX

QOMPLX

QOMPLX integrate, contextualize, and analyze data from virtually any source to help you identify operational risk and inefficiencies throughout the enterprise.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

NewGens

NewGens

NewGens is a solution and service provider to banking institutions in the APAC region. Areas of expertise include cybersecurity, AML, fruad prevention, compliance and risk management.

BLOCKO

BLOCKO

BLOCKO is a blockchain specialized technology company that has experienced and achieved the largest amount of business in South Korea.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Badge

Badge

Badge authenticates you on-demand for every application, on any device, without storing any secrets.