News

2022-08-09

Dealing With Cyber Security Threats Is Hard Work

Cyber Security Is Hard. Technology is continually changing; cyber criminals' techniques are evolving and security is a constant challenge.

2022-08-09

Hot Competition To Build 5G In India

India's massive auction of radio spectrum for 5G telecommunications has become a fierce competition, generating bids in excess of $19 billion.

2022-08-09

US Federal Court Court IT Systems Breached

Hackers and other criminals may have had access to documents across the US Court Electronic Records and Case Management systems.

2022-08-08

Taiwan's Government Websites Attacked Just Before Pelosi’s Visit

Sending A Message: Taiwan’s presidential office and other agencies were attacked a few hours before US House Speaker Nancy Pelosi’s arrival.

2022-08-08

Cyber Attack On NHS Software Services

NHS Hotline Goes Offline: An extended software outage affecting non-emergency 111 telephone and other services was caused by a cyber attack.

2022-08-08

AI Driven Anomaly Detection In The Oil & Gas Industry

Drone In A Box: A drone using data anomaly detection software alongside sophisticated imaging will improve detection of leaks in the network.

2022-08-05

Cybersecurity Essentials For Cloud Environments

Cloud security works in two parts - the security of the cloud and the security in the cloud. It's that part users should focus on. By Hugh Raynor

2022-08-04

Github Supply Chain Attack

Somebody cloned over 35,000 Github repositories and kept them identical to the original source code, with the addition of malicious code.

2022-08-04

Perimeter 81 / Zero Trust Network Access Guide

Curious how you can Implement a Zero Trust roadmap with insights from Gartner? Download this Free report for a limited time only.

2022-08-03

New British Cyber Advisor Scheme

The NCSC is launching a Cyber Advisory Service to extend a trusted source of cyber security advice to a wider range of organisations. 

2022-08-03

How to Prepare Your Security Team For The Future Of Vulnerability Management

Vulnerabilities Are Not Equal: Security teams should use a risk-based vulnerability prioritization, automated tools & effective controls. By Lisa Xu

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

Guardea Cyberdefense

Guardea Cyberdefense

Guardea Cyberdefense is an IT services company specializing in the management of security projects, with a pool of skills selected from a network of specialized partners.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Avatier

Avatier

Avatier identity management software products automate identity access management, user provisioning and IT governance to ensure information security and compliance.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity

Deep Mirror Automotive Cybersecurity make Cars & Infrastructures Cybersecure.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

ICS-CSR

ICS-CSR

ICS-CSR is a research conference bringing together researchers with an interest in the security of industrial control systems.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Certcube Labs

Certcube Labs

Certcube Labs provide a broad range of services in the areas of Assessments, Development, Risk Advisory, Blockchain, Forensics Investigations, Managed Security Solutions, and IT Security Trainings.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Defendis

Defendis

Defendis develops AI-powered cybersecurity solutions for Government Agencies, Banks, and Businesses, designed to helps them contain data leaks, minimise damage, and proactively hunt for new threats.