News

2020-12-29

Is This The Hack Of The Decade?

Microsoft was hacked in the campaign against multiple US government agencies that took advantage of weaponised SolarWinds software.

2020-12-24

Major Cyber Attack On US Government Agencies Blamed On Russia

Secretary of State Pompeo has blamed Russia for what is being described as the worst-ever cyber espionage attack on the US government.

2020-12-23

You Should Prepare Your Organization For A DDoS Attack

DDoS attacks are very serious and are becoming even more costly. If you’re running a business, you have to know how to prepare for them.

2020-12-23

Plans To Divide US Cyber Command And The NSA

Outgoing Pentagon officials are seeking fast-track approval to divide the leadership of the National Security Agency and US Cyber Command.

2020-12-21

How To Optimize The DevSecOps Pipeline

DevSecOps is the method of applying essential security rudiments to the regular DevOps cycle through a coordinated effort.

2020-12-23

The SolarWinds Hack Can Directly Affect Industrial Control Systems

Sophisticated Russian hackers compromised SolarWinds' Orion platform, taking over control of IT infrastrucure & industrial control systems.

2020-12-22

The Different Types of Malware

Business owners must be aware of the implications of different types of malware and how to protect their company. By Ashley Lukehart

2020-12-24

The Impact of Covid-19 On Cyber Security Threats

The coronavirus pandemic of late 2019 and 2020 has changed the way some businesses will operate forever.

2020-12-21

Advanced Threat Detection And Response: Critical Steps

In every organisation it’s now critical to implement effective threat detection systems and respond to potential danger promptly. By Jennifer Holland

2020-12-20

Tech Support Scams Steal Millions

Criminals are cold calling victims, pretending to be from reputable ISPs, claiming that the victim has a problem with their computer or internet.

2020-12-18

The End Of The American Cyber Empire

Russia has accomplished the goal of undermining the entire low intensity conflict “battlefield” of the American cyber system. By Ronald Marks

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Rackspace Technology

Rackspace Technology

Rackspace Technology is a leading provider of managed services across all major public and private cloud technologies. Secure your IT environments with powerful cloud security solutions and support.

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

BGD E-GOV CIRT

BGD E-GOV CIRT

BGD e-GOV CIRT's mission is to support government efforts to develop ICT programs by establishing incident management capabilities within Bangladesh.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Adlink Technology

Adlink Technology

ADLINK is a leading provider of embedded computing products and services for applications including IoT and industrial automation.

Compnet

Compnet

Compnet is a service company that assists customers in integrating complete ICT systems including network infrastructure and security solutions.

Data443 Risk Mitigation

Data443 Risk Mitigation

Data443 Risk Mitigation provides next-generation cybersecurity products and services in the area of data security and compliance.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Brightsolid

Brightsolid

Brightsolid are experts in Hybrid Cloud. We design, build and manage secure, scalable cloud environments that meet customers’ business ambitions.

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Automotive Information Sharing & Analysis Center (Auto-ISAC)

Auto-ISAC provides a forum for companies to analyze and identify threats sooner and share solutions that enhance vehicle cybersecurity.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.