News

2022-04-19

Software Industry Mergers and Acquisitions 2022

The software industry has seen M&A activity worth $160 billion in 2022 to date, notably including huge deals for acquisition of Citrix and Mandiant.

2022-04-20

Police Shut Down RaidForums Hackers

The notorious hacking marketplace, RaidForums, has been shut down and its infrastructure seized in a major Europol operation.

2022-04-20

Microsoft Removes Domains Used For Cyber Attacks On Ukraine

Fancy Bear: Microsoft has seized control of seven domains used by Russian threat actors for attacks that targeted digital access in Ukraine.

2022-05-02

EU Officials Targeted with Pegasus Spyware

Unprecedented Intrusion: Senior European Union officials, including the Justice Commissioner, were targeted with Pegasus spyware.

2022-04-20

Remote Access Scams Open The Door To Thieves

British users lost £50m in remote access scams where victims are tricked into handing over control of their computer or smartphone to criminals.

2022-04-21

Algorithms, Lies & Social Media

Achieving a more transparent and less manipulative online media may well be the defining political battle of the 21st century.

2022-04-19

Russia’s AI Plans Might Not Survive The Ukraine War

Russian ambitions to become a leader in Artificial Intelligence are being frustrated by Western sanctions and global high-tech isolation.

2022-04-18

The Ukraine War - By Satellite, Internet & Phone

Technology can serve a vital purpose in this conflict, facilitating the exposure of Russian propaganda & accelerating efforts to defeat their forces. 

2022-04-18

Types Of Security Testing Explained With Examples

Security testing encompasses all testing activities to ensure an application is correct and has faultless operation in a test environment.

2022-04-14

What Can The Healthcare Sector Learn From 2021’s Threat Landscape?

A Unique Challenge: At a time when the health sector is at its most vulnerable, it should also be at its most secure. By Ian Porteous

2022-04-13

EU & US Agree New Data Rules To Replace Privacy Shield

A new framework for cross-border data transfers provides some welcome clarity for the big US technology firms, including Meta, Microsoft & Google.    

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

CYBERSEC Forum

CYBERSEC Forum

CYBERSEC Forum is an annual European Public Policy Conference dedicated to strategic aspects of cybersecurity.

7 Elements

7 Elements

7 Elements is an independent IT security testing company providing expertise in technical information assurance through security testing, incident response and consultancy.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

Cyber Tec Security

Cyber Tec Security

Cyber Tec Security is an IASME Certification Body for Cyber Essentials basic/Plus. We also provide ongoing Managed Security Services.

C11 Cyber Security & Digital Innovation Centre

C11 Cyber Security & Digital Innovation Centre

C11 is working with local and national partners to develop talent and bring brilliant minds and brilliant businesses together.

Incopro

Incopro

Incopro is an online IP and brand protection software provider that arms brand owners with actionable intelligence to combat online and offline intellectual property and copyright infringements.

Tokio Marine HCC

Tokio Marine HCC

Tokio Marine HCC is a leading specialty insurance group with a Financial and Professional product line including Tech and Cyber.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Absa Cybersecurity Academy

Absa Cybersecurity Academy

Absa Cybersecurity Academy is an initiative aimed at empowering marginalised South African youths to become certified cybersecurity specialists.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

CybersCool Defcon

CybersCool Defcon

CybersCool is committed to educate and train, re-skill and up-skill the current workforce of various industries and businesses in the knowledge and know-how of cybersecurity.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

DYOPATH

DYOPATH

At DYOPATH we work with the single purpose of helping our clients combat the ongoing increase of cyber threats, the growth in more complex IT environments, and ever-increasing human capital shortages.