News

2024-08-29

Mobile & On-Line Banking Cyber Security [extract]

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-29

Iranian Hackers Target Israeli Citizens

Hackers though to be connected to the government of Iran have stepped up phishing attacks targeting high-profile individuals in Israel.

2024-08-29

Mobile & On-Line Banking Cyber Security

Managing Your Money Online: Banks take your security seriously, but it's still important that you take steps to stay safe while banking online.

2024-08-28

Enhancing SaaS Security: Leveraging VPNs & ITDR to Combat Identity Theft:

Organizations can establish a strong barrier against the various dangers aimed at their networks by adopting ITDR and VPNs in their security plan.

2024-08-28

Hacker Kills Himself

Hacker Fakes His Death To Avoid Child Support: He became officially registered as a deceased person in many government databases.

2024-08-28

US Proposes New Cyber Security Standards For Aviation

Aircraft are increasingly designed to be connected to both internal & external data networks, rendering them more vulnerable to cyber threats.

2024-08-30

China Aims to Compete With OpenAI, Gemini & Grok

Update: OpenAI’s decision to ban their products in China is accelerating the rise of Chinese AI companies, in fierce competition with US platforms.

2024-08-28

California's Controversial AI Bill Will Soon Be Law

California’s AI Act is important as it will set the precedent for state guidelines across the US, laying down rules for developers working on GenAI.

2024-08-27

RansomHub Have A Tool That Neutralises EDR

Endpoint Detection & Response Threat: Organisations are recommended to enable extra tamper protection on their endpoint security defences.

2024-08-27

Telegram Messaging Platform Founder Arrested

Billionaire CEO Pavel Durov is under arrest in France on multiple charges of fraud, drug trafficking & organized crime being carried out on Telegram.

2024-08-25

Virtual Numbers & eSIM Technology Compared

Virtual Numbers: A profitable alternative to traditional telephone communication - they are not tied to a specific location and constantly available.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Baker McKenzie

Baker McKenzie

Baker & McKenzie is an international law firm. Practice areas include Data & Technology.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

PakCERT

PakCERT

PakCERT is the national Computer Emergency Response Team for Pakistan.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

Gulf Computer Services Co (GCSC)

Gulf Computer Services Co (GCSC)

Gulf Computer Services is a major player in the field of networking & Communication solutions for emerging industries such as Internet Services and Information Technology in Saudi Arabia.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

BicDroid

BicDroid

BicDroid is a world leader in data and cyber security with innovative solutions that protect your data anywhere, anytime, against everything.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

Blue Bastion

Blue Bastion

Don’t give cybercriminals the chance to find weaknesses in your company’s cyber security system. Defend your institution from all attacks from all directions with Blue Bastion.

CyberMontana

CyberMontana

CyberMontana is a statewide initiative providing cybersecurity awareness, training, and workforce development for businesses and residents of Montana.

Cyber Defense International (CDI)

Cyber Defense International (CDI)

At CDI, we utilize decades of experience in designing and building large-scale cybersecurity programs, creating tailored solutions and services that protect businesses from cyber threats.

Telenor Cyberdefence

Telenor Cyberdefence

Telenor Cyberdefence is a newly established (2024) cloud-born Managed Security Service Provider focused on the Nordic markets.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.