News

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-09-29

The Effects Of The Internet On Society

The Internet has turned our existence upside down. It has revolutionised daily communications but has both positive and some negative effects.

2020-09-28

Confidential US Court Documents Published On The Dark Web

Across the USA, local governments & public sector entities have endured a wave of ransom attacks. None more so than in Louisiana.

2020-10-14

Social Media: An Exclusive 3 Part Review

With more than 3.5 billion users, social media is now a preferred medium for businesses to reach out to its target audience. Take A Closer Look.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-28

Directors Must Understand Their Organisation’s Cyber Risks

Business leaders must engage with and understand the risk profile for the commercial sector that their business is engaged with.

2020-09-29

How To Transmit Sensitive Information Over The Internet

Here are simple and efficient tips on how to protect the confidential data & information that you share online. By David Fisher

2020-09-25

Cyber Security Companies Exposed On The Dark Web

Over 95% of leading cybersecurity companies had their data exposed on the Dark Web in 2020, with 160,000 critical incidents risking client data.

2020-09-25

Ransomware Is On the Rise: How to Prevent Attacks

Ransomware has quickly become the greatest malware threat in the digital world. What is it and how do you prevent an attack from happening?

2020-09-24

Government, Cyber Attacks, Terrorism & Piracy

Cyber-attacks do not require large financing for weapons or recruits, but the effects can be global, immediate and devastating. By Alfred Rolington

2020-09-23

New Iranian Ransomware Groups Detected

Two new Iranian hacking groups using ransomware have recently been identified. One is a highly professional team, the other less so.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

SecurityScorecard

SecurityScorecard

SecurityScorecard provides the most accurate security ratings & continuous risk monitoring for vendor and third party risk management.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

TechVets

TechVets

TechVets is a non-for-profit helping UK veterans and service leavers retrain into Cyber Security and Technology jobs.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Cybersecurity Professionals

Cybersecurity Professionals

Search vacancies from top cyber security jobs worldwide on CyberSecurity Professionals. View IT security jobs or upload your CV to be seen by recruiters from industry leading firms.

GMV

GMV

GMV is a technological business group offering solutions, services and products in diverse sectors including Intelligent Transportation Systems, Cybersecurity, Telecoms and IT.

Hold Security

Hold Security

Hold Security works with companies of all sizes to provide unparalleled Threat Intelligence services that actually make a difference.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

WinMagic

WinMagic

At WinMagic, we’re dedicated to making authentication and encryption solutions that protect data without causing user friction so that everyone can work freely and securely.

Systems Engineering

Systems Engineering

Systems Engineering is a SOC 2, Type 2-certified IT strategy and managed technology services provider.

Afripol

Afripol

AFRIPOL was set up to strengthen cooperation between the police agencies of AU member states in the prevention and fight against organized transnational crime, terrorism, and cybercrime.

When Group

When Group

World Health Energy Holdings, Inc. (d/b/a WHEN Group) is a High Tech Holding Company that specializes in the Cyber, Security and Telecom area.