News

2021-10-05

Data Is Your Most Valuable Asset. How Are You Protecting Yours?

Backup: Keeping a copy of data is not sufficient, you need an effective system that can protect and support it, everywhere. By Colin Tankard

2021-10-05

Facebook, WhatsApp & Instagram Suffer Massive Outage

Facebook's social media platform, WhatsApp and Instagram all simultaneously went down for six hours overnight but are now back up and running.

2021-10-04

Students Warned Of Tax Refund Frauds

In the past year almost one million people reported fraud attempts to HMRC and over 900,000 students with part time jobs could be at risk.

2021-10-04

EU Competitions: Cyber Security Enthusiasts Invited to Enter

Two international team competitions this month organised to promote awarenes among new potential entrants to the cyber security profession. 

2021-10-04

Webinar: How to build a secure access service edge (SASE) model in the AWS Cloud

Thursday 21 October | SANS & AWS Marketplace will share how organizations can use SASE to enhance security for modern infrastructures.

2021-10-01

US Cyber Security Chiefs Support Mandatory Incident Reporting

The Director of CISA tells US Senators to enforce mandatory cyber incident reporting for federal agencies, contractors and many private firms.

2021-09-30

Incident Response In The AWS Cloud

All AWS users must have an appreciation of security incident response procedures and how to react to security issues. By Gilad David Mayaan

2021-09-30

Connected Cars - What Does Your Car Know About You?

Personal Details: Name, phone number & address - are the most common data that car makers collect, but much more data is becoming available.

2021-09-30

Treason: Top Cyber Security Executive Arrested

The CEO of top Russian cyber security company Group IB, has been arrested on suspicion of state treason, punishable by up to 20 years in jail.

2021-09-29

Cyber Security Priorities For The New Normal

New Normal: CISOs have the simultaneous challenges of building cyber preparedness, minimising risks & ensuring business continuity.

2021-09-28

Europol Breaks Open Mafia Cyber Crime Group

The Mafia group were using hackers specialised in latest-generation phishing and in the use of social-engineering techniques to steal $12million.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TeleTrusT

TeleTrusT

TeleTrust is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Internet Storm Center (ISC)

Internet Storm Center (ISC)

ISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with ISPs to fight back against the most malicious attackers.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

OffSec

OffSec

OffSec have defined the standard of excellence in penetration testing training. Elite security instructors teach our intense training scenarios and exceptional course material.

Alcon Maddox

Alcon Maddox

Alcon Maddox is a niche recruitment and executive search firm specialised in sourcing exceptional Cyber Security sales and commercial leadership talent. Serving clients across the Middle East & Europe

Xperience

Xperience

Xperience solves our clients’ toughest challenges by delivering business efficiency through digital transformation solutions across cloud, managed IT, CRM and ERP.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Digistor

Digistor

Digistor is a leading manufacturer of industrial-grade flash storage products, secure storage products, and Removable Secure Data Storage.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

All About Cookies

All About Cookies

All About Cookies is an informational website that provides tips, advice, and recommendations to help you with Online Privacy, Identity Theft Prevention, Antivirus Protection, and Digital Security.

Telit Cinterion

Telit Cinterion

Telit Cinterion is a global enabler of the intelligent edge providing highly secure IoT solutions, modules and services.

BLOCX

BLOCX

BLOCX is designed to address the ever-growing challenges of managing and securing digital devices, from personal computers to corporate networks.