News

2022-03-29

Conti Operates Like A Sophisticated Corporation

Hidden In Plain Sight: Staff think they are working for a legitmate Russian High-Tech firm, but in reality it is a notorious ransomware group.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

2022-03-28

Only A Few Employees Cause The Majority Of Breaches

Research has found that 4% of employees clicked 80% of phishing links and that 3% were responsible for 92% of malware events.

2022-03-22

US Moves Cyber Defences To High Alert

Americans should ‘lock their digital doors’ to prepare for a Russian cyber attack as federal agencies and busineses are urged to remain vigilant.

2022-03-22

Two Thirds Of Organisations Are Not Equipped To Deal With Cyber Threats

Only 27% of those surveyed have advanced threat protection on every endpoint device, placing access to corporate applications at great risk.

2022-03-19

Georgia Must Bolster Resilience To Information Warfare

The invasion of Ukraine has important lessons for the ex- soviet republic of Georgia, which now urgently needs to tackle Russian disinformation.

2022-03-18

Convergence & Digitalisation Create Problems For Energy Utilities

The convergence of previously separate sectors around renewable smart grids is eroding control over energy cyber security. By Steven O’Sullivan

2022-03-17

How To Improve Cyber Security Visibility & Control

Your cyber security strategy needs the right tools & services in place, integrated with effective employee education & testing. By Leyton Jefferies

2022-03-16

Trends In Application Connectivity & Network Management

Best Practice: There is a pressing need to focus on the risk inherent in applications when dealing with network security. By Avishai Wool

2022-03-16

Israeli Government Websites Knocked Offline

State Of Emergency: Israeli government websites were taken offline in one of the largest cyber attacks ever launched against the country.

2022-03-15

The Lessons Learned From Log4j

Open Source Software Has Its Drawbacks: When threats arise, some software support is more responsive than others. By Timothy Boles

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

CQS (Certified Quality Systems)

CQS (Certified Quality Systems)

CQS is an organisation specialising in ISO assessment and certification, including ISO 27001, along with other management system standards.

European Cyber Security Organisation (ECSO)

European Cyber Security Organisation (ECSO)

The main objective of ECSO is to support all types of initiatives or projects that aim to develop, promote and encourage European cybersecurity.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

Aeriandi

Aeriandi

Aeriandi is a leading provider of hosted PCI security compliance solutions for call centres, trusted by high street banks and major Telcos.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

FileWave

FileWave

FileWave offers a single solution for managing apps, devices, and more for Mac, Windows, and mobile devices.

Huntress Labs

Huntress Labs

Huntress provides managed threat detection and response services to uncover and address malicious footholds that slip past your preventive defenses.

Cyber Risk Aware

Cyber Risk Aware

Cyber Risk Aware provide a security awareness and phishing simulation platform that focuses on real threats and educates and empowers employees to be the first line of defence.

Carve Systems

Carve Systems

Carve Systems was founded to bring enterprise level information security, training, and risk management services to organizations of any size and industry.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

NormCyber

NormCyber

NormCyber provide award-winning cyber security and data protection as a service for midsize organisations.

Aquia

Aquia

Aquia are on a mission to enable innovation and drive transformative change to solve the world’s most pressing and complex cybersecurity challenges.

HP Wolf Security

HP Wolf Security

HP Wolf Security protects your organization and devices from cyberattacks no matter where, when or how you work.

Lenze

Lenze

Lenze are an experienced partner for automation systems, digitalization and cyber security.

MIND

MIND

MIND is the first-ever data security platform that puts data loss prevention and insider risk management programs on autopilot, so you can automatically identify, detect and prevent data leaks.