News

2022-04-26

Digital Experience Monitoring - The Future Of Remote & Hybrid Work

Digital Experience Management is the ideal strategy for measuring the impact of the digital experience on productivity. By Naveena Srinivas

2022-04-26

Cyber Security Weak Points That Business Leaders Should Know About

Security Threats Are't Going Away: Board members need to understand their risks from a business continuity and a cyber security standpoint.

2022-04-26

Iran Has Stopped A Large Scale Infrastructure Attack

Unamed cyber attackers were planning to exploit a security gap in the software most widely used by infrastructure organisations in Iran.

2022-04-26

Elon Musk's Deal To Buy Twitter

Twitter is in the final stages of negotiation for the innovative automotive & space billionaire to buy the social media platform. What's next?

2022-04-25

Business Leaders Have A Legal Liability When A Data Breach Occurs

Cyber security starts at the top, because if top management don't take cyber security seriously, neither will the front-line employees. 

2022-04-25

Half Of Phishing Emails Target LinkedIn Accounts

User Beware: The professional networking website is one of the most popular brands targeted by cyber criminals in phishing attacks.

2022-04-25

The Cyber Delusion Challenge For Small & Medium Businesses

With the increased sophistication of cybercrime tools, what can SMBs do to combat the mounting threats that they face? By John Davis

2022-04-22

Identity & Authentication For Mobile Users

For mobile users, there is a clear gap in the level of trust between the level of expectations from consumers versus real experience. By Dario Betti

2022-04-25

The Vital Importance Of Pen Testing

Penetration Testing is vital to protecting your organisation against attack and reassuring your employees, customers and regulatory authorities. 

2022-04-20

Hackers Plan Attacks On Key US Industrial Control Systems

Hackers have new tools to get full system access to a number of Industrial Control System and Supervisory Control & Data Acquisition devices.

2022-04-20

Pegasus Spyware Used To Target British Prime Minister

Evidence found of surveillance software being present on devices associated with the British Prime Minister’s Office at 10 Downing Street.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Yokogawa Electric

Yokogawa Electric

Yokogawa is an electrical engineering company providing measurement, control, and information technologies including industrial cyber security.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

Jiran Security

Jiran Security

Jiran Security provides data and application security solution over email, mobile device and endpoints.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Sabasai

Sabasai

Sabasai specialises in all aspects of insider threat management from training and education to building security frameworks and insider threat programs to on-site risk & vulnerability assessments.

Vector Informatik

Vector Informatik

Vector Informatik is a specialist in automotove electronics and provides services, embedded software and tools for securing embedded systems against cyber-attacks.

DeepSeas

DeepSeas

DeepSeas is the result of a merger between Security On-Demand (SOD) and the commercial Managed Threat Services (MTS) business of Booz Allen Hamilton.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

Mindmajix Technologies

Mindmajix Technologies

Mindmajix is a live and interactive e-learning platform that offers professional online IT training in areas including cyber security.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Nitel

Nitel

Nitel is a leading next-generation technology services provider. We simplify the complex technology challenges of today’s enterprises to create seamless and integrated managed network solutions.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.