News

2024-07-26

CrowdStrike’s Cyber Outage Will Cost $Billions

With regulatory penalties and many costly lawsuits in preparation, CrowdStrike's investors face $billions in fines, legal fees and lost revenue. 

2024-07-26

Wiz Rejects Google's $23b Acquisition Offer

Wiz has decided not to go forward with an unprecedented deal to be acquired by Google's parent and will remain an independent company.

2024-07-26

How Small Businesses Can Develop Cyber Resilience

To stay competitive, small businesses need to strengthen cyber resilience, secure their customer data & protect their IT systems. By Jochen Haller

2024-07-25

Improving Cyber Resilience Of Frontline Armed Forces In Europe

Exercise Baltic Mule: Making sure that the NATO allies are better equipped to protect current and future military activity from cyber threats.

2024-07-25

Israel-Hamas Conflict: The Escalation Of Cyberwarfare

Malware, Hacktivism & Disinformation: The ramifications of the Middle East cyberwar will impact organizations around the world. By Craig Watt

2024-07-24

Progress In Deepfake Detection

Identity Swaps: Researchers at Nanjing University have classified deepfakes Into four main types, each one posing a different threat.

2024-07-24

Beware The Ghost Stories Of Cyber Space

Presented with false & distorted information, magnified from multiple sources, US voters should ask these three questions. By Ron Marks

2024-07-23

The CrowdStrike Incident Means Companies Must Review Their Cloud Strategies

For CISOs, this event is a sharp reminder of the fundamental risks associated with over-reliance on a single supplier, especially in the cloud.

2024-07-23

Proposed British Digital Information & Smart Data Bill

Harnessing The Power of Data: An important move for data protection, particularly for reforms around Digital Verification Service. By David Varney

2024-07-22

Student Who Sold Cyber Attack Software Is Jailed

DDoS For Sale: A student in Scotland gets a conviction for creating and distributing a mobile app he designed to disrupt corporate websites.

2024-07-19

Semiconductor Manufacturing Companies Stocks Fall

The soaring share prices of the makers of advanced semiconductors has crashed following statements from Donald Trump & the US government.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Huawei

Huawei

Huawei is a leading global ICT solutions provider. with end-to-end capabilities across the carrier networks, enterprise, consumer, and cloud computing fields.

Securezoo

Securezoo

Securezoo's mission is to simplify and enhance information security by providing trusted security guidance, products, and information to small and mid-sized businesses and security professionals.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

BlackBerry Security Services

BlackBerry Security Services

Blackberry provides intelligent security software and services to enterprises and governments around the world.

Bavarian IT Security Cluster

Bavarian IT Security Cluster

The Bavarian IT Security Cluster works to build regional IT security competencies and increase the competitiveness and market opportunities of its member companies.

IT Career Switch

IT Career Switch

An IT Career Switch Traineeship is the easiest way to start a new career in IT or Cybersecurity with fantastic career prospects.

Prove Identity

Prove Identity

Prove (formerly Payfone) is a leader in mobile & digital identity authentication for the connected world.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Punk Security

Punk Security

Punk Security are specialists in integrating security into DevOps pipelines, enabling rapid and secure development.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

Sycope

Sycope

Sycope is focused on designing and developing highly specialised IT solutions for monitoring and improving network and application performance.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.