News

2024-06-24

Leveraging The Benefits Of LLM Securely 

Holistic protection across the cloud native application lifecycle will enable business to embrace the full potential of GenAI. By Gilad Elyashar

2024-06-24

US Blocks Leading Cybersecurity Firm Kaspersky

Three Month Deadline: Kaspersky will no longer be able to sell it’s software or provide updates to software already in use by US customers.

2024-06-24

Facebook Phishing Emails Are Targeting Businesses

Be Aware: Fraudsters are increasingly inventive in finding ways to trick people into giving away their money & sensitive personal information. 

2024-06-24

Five Reasons Your Organization Needs API Security Testing

API security testing is a key component in safeguarding digital assets, ensuring the integrity & confidentiality of data transmitted across systems.

2024-06-21

Hackers Publish Stolen Blood Test Data From London Hospitals

The group behind the recent Snynnovis attack that is disrupting operations at several major hospitals in London has published stolen data online.

2024-06-20

Artificial Intelligence Is Changing Education 

The widespread introduction of  AI has taken only a few months for Generative AI and ChatGPT to change education.

2024-06-20

Industrial Operating Technology Faces An Urgent Challenge

Major cybersecurity agencies have issued an “urgent warning” on industrial cybersecurity - and how organisations can heed it. By Edgardo Moreno

2024-06-19

Navigating cloud security: The importance of posture management tools

On Demand: Watch this webinar to see how cloud security posture management (CSPM) tools can fit into your cloud security strategy.

2024-06-19

Facts About Fake Election Advertising

Deepfakes Pose A Threat To 2024 Elections: Thousands of political ads on Facebook have been found to be in breach of Meta's own transparency rules.

2024-06-19

Combatting Zero-Day Exploits In Financial Services

Best Practices For Finance Institutions: Zero-day attacks disrupt critical systems, causing downtime & big operational challenges. By Dominik Birgelen

2024-06-18

Top Ten IoT Security Challenges & Solutions

The interconnected nature of IoT devices amplifies the importance of maintaining strong security practices across all levels of the network.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Fredda Stanza

Fredda Stanza

Fredda Stanza specialize in Information Security and Forensics Consulting.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

Dome9

Dome9

Dome9 is a cloud firewall management service that stops vulnerabilities, secures remote access, and centralizes policy management.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

CERT NZ

CERT NZ

CERT NZ supports businesses, organisations and individuals affected by cyber security incidents, and provide trusted and authoritative information and advice.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

National Cyber Security Center (NCSC) - Hungary

National Cyber Security Center (NCSC) - Hungary

The National Cyber Security Center was established in 2015 by uniting the GovCERT-Hungary, National Electronic Information Security Authority (NEISA) and the Cyber Defence Management Authority (CDMA).

CI-CERT

CI-CERT

CI-CERT is the national Computer Incident Response Team for Cote d'Ivoire.

OcuCloud

OcuCloud

OcuCloud protects businesses' valuable information in the cloud, preventing security breaches caused by employees and remote vendors.

Axonius

Axonius

Axonius is the only solution that offers a unified view of all assets and their coverage, empowering customers to take action to enforce their organization’s security policies.

SyferLock Technology Corp.

SyferLock Technology Corp.

SyferLock is an innovative provider of next-generation authentication and security solutions.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command (FLTCYBER)

US Fleet Cyber Command is responsible for Navy information network operations, offensive and defensive cyberspace operations, space operations and signals intelligence.

Inversion6

Inversion6

Inversion6 (formerly MRK Technologies) is a cybersecurity risk management provider that offers custom security solutions.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.