News

2019-08-27

Cyber Strategy & Cyber Security

The internet grows bigger, faster and more powerful each passing day. Decision-makes must ensure they understand the benefits and the risks.

2019-08-26

Ransomware Hits Texas For Six

Over 20 local governments have suffered a co-ordinated attack from somebody who is demanding a $multimillion ransom.

2019-08-27

The EU's New Cybersecurity Certification Framework

A new Cybersecurity Certification scheme covers use of network & information systems by citizens, organisations & businesses across the EU.

2019-08-27

Psycho-Cyberchology

Organisations fighting against cybersecurity breaches have a new weapon: Cyberchology, psychometric tests to find safer personality types.

2019-08-27

Securing Your Organisation’s Office 365 Environment

If your business uses O365 or is considering migrating to the service, here’s some top tips to help keep your business secure. By Chester Avey.

2019-08-26

Cyber Crime In Britain

The UK National Crime Agency say Russian cyber groups are threatening UK interests, but home-grown cyber criminals are a rising threat.

2019-08-24

Best UK Cyber Jobs Without A Degree

Getting Ahead: The demand for cyber skills is opening up numerous well- paid job opportunities for non-graduates.

2019-08-23

What’s On The Dark Web?

The normal web is just a small part of the Internet. Using Tor, you can get access, but what are the issues around visiting the Dark Web?

2019-08-21

Pakistan Clashes With India In Cyberspace

Pakistan has unleashed a social media campaign to promote anti-India propaganda following a disagreement over the region of Kashmir.

2019-08-21

Over 60% of Enterprises Fail to Build Effective Cloud Security

Over half of organisations are using cybersecurity methods that fail to keep pace with the changes and up-grades that their cloud security requires.

2019-08-21

Cyberwar Between Nation-States Damages Business

Businesses are at risk of becoming “collateral damage” in nation-state cyber conflicts and need to be protected in a fundamentally new way.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

NetMonastery DNIF

NetMonastery DNIF

NetMonastery is a network security company which assists enterprises in securing their network and applications by detecting threats in real time.

Balbix

Balbix

Balbix BreachControl™ is the industry’s first system to leverage specialized AI to provide comprehensive and continuous predictive assessment of breach risk.

TrustMAPP

TrustMAPP

TrustMAPP automates cybersecurity & privacy assessments, with universal workflow, allowing teams to generate analytics and recommendations to align priorities for improvement.

Cyber Security Cloud (CSC)

Cyber Security Cloud (CSC)

Cyber Security Cloud provides web application security services worldwide using world's leading cyber threat intelligence and AI technology.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Cyber Gate Defense (CyberGate)

Cyber Gate Defense (CyberGate)

CyberGate is an Emirati establishment founded with an objective to provide cyber security services that would improve the overarching cyber security posture of the UAE.

Sydeco

Sydeco

Sydeco offer a complete range of products that secure computer and industrial networks, servers, programs and data against any type of computer attack.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

PreVeil

PreVeil

We started PreVeil to bring radically better security to ordinary business and personal communication and information storage.

LogicMonitor

LogicMonitor

LogicMonitor provides SaaS-based IT infrastructure monitoring services for on-premises and multi-cloud environments.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

Skyhigh Security

Skyhigh Security

Skyhigh Security enables your remote workforce while addressing your cloud, web, data, and network security needs.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Hive

Hive

Hive is a leading provider of cloud-based AI solutions to understand, search, and generate content, and is trusted by hundreds of the world's largest and most innovative organizations.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.