News

2024-06-03

Shiny Hunters Attack Santander Bank

Hackers responsible for the massive breach at Ticketmaster have stolen the confidential information of 30 million Santander employees & customers.

2024-05-30

Email Encryption: What It Is & How It Works

Email Encryption: An essential tool that keeps users' sensitive information safe from threats like hacking, fraud, data breaches and identity theft.

2024-05-31

Online Fraud - Police Agencies Recover Stolen $Millions

Operation Endgame: Europol & the US Dept of Justice make arrests and recover stolen funds in separate operations against botnet & malware thieves.

2024-05-31

Telecoms - Beware Of The DDoS Threat Actor

Combatting the wave of DDoS attacks against the telecommunications industry is critical to protecting global connectivity. By Richard Hummel

2024-05-31

The Key Components Of Embedded Systems Development Services

Embedded systems development services are essential for businesses and industries seeking to leverage the power of customized & efficient systems.

2024-05-31

Safeguarding Data In The Quantum Computing Era

Quantum Apocalypse: Now is the time to start learning about existing quantum-resistant encryption technologies & solutions. By Prof. Nigel Smart

2024-05-30

Massive Breach At Ticketmaster

1.3 Terabytes Of Data Stolen: Ticketmaster has been hit by a cyber attack by the 'Shiny Hunters'. Sensitive customer data is for sale for $500k.

2024-05-30

Five AI-driven Features to Enhance Payment Gateway Security

Incorporating AI-driven features into payment gateway security frameworks is essential for staying ahead of sophisticated cyber threats.

2024-05-29

Hackers Exploit GitHub & FileZilla To Deliver Malware

Fake GitHub accounts & repositories resembling real software programs, but filled with malware, designed to access computers and steal data.

2024-05-29

Google AI Makes Embarrassing Errors

Google has attracted derision after its proprietary AI tool, Overview, produced inaccurate, in some cases bizarre, answers to user questions.

2024-05-28

Minimizing The Impact Of Human Factors In Cybersecurity Errors

The Human Factor Is A Liability: Cybersecurity is never one and done. This is a continuous effort and continuous effort always requires consistency.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Bloombase

Bloombase

Bloombase is the leading innovator in Next-Generation Data Security solutions for Global 2000-scale organizations

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

YesWeHack

YesWeHack

YesWeHack offers companies an innovative approach to cybersecurity with Bug Bounty (pay-per-vulnerability discovered) to identify and report vulnerabilities in their systems.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

MailChannels

MailChannels

MailChannels protects companies against malicious email threats. Used by 750+ hosting providers around the world.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

iomart Group

iomart Group

iomart is a cloud computing and IT managed services business providing secure hybrid cloud, network connectivity, data management, and digital workplace capability.

Next DLP

Next DLP

Next DLP (formerly Jazz Networks) is a leading provider of insider risk and data protection solutions.

Amplix

Amplix

In the race to create value for your enterprise, Amplix is your best asset for making technology decisions and optimizing your IT infrastructure, cloud usage, and security posture.

Capzul

Capzul

Capzul are transforming the network security landscape with a new approach; creating virtually impenetrable networks, precluding cybercriminal attacks on your network ecosystem.

XY Cyber

XY Cyber

XY Cyber enable Generative AI for Cyber Operations. We simplify the complex world of cyber threats into actionable strategies, empowering your defense with AI-powered solutions.