News

2024-05-29

The Future Of Online Security: Predictions On Upcoming Cybersecurity Functions 

New Risks In The Evolving Landscape Of The Internet: Strategies for safeguarding individuals and businesses in the digital realm.

2024-05-25

OpenAI Simulate Scarlett Johansson's Voice Without Permission

'Eerily Similar': OpenAI used a voice very like that of the actress for their new GPT-4 chatbot after she turned down a request to use her real voice. 

2024-05-28

Networking Technology In Education

Keeping Schools, Students & Staff Secure: Schools face growing challenges addressing proliferating issues with online security. By Gary Roche

2024-05-28

Facial Recognition Technology Defects

Misidentified: Facial recognition technology produces inaccurate results and its widespread deployment risks dangerous consequences.

2024-05-24

Staff Data Breach: British Police Could Be Fined £750k

The Police Service of Northern Ireland faces a penalty for a major data breach after mistakenly exposing names of thousands of serving officers.

2024-05-24

Time For Cyber Force

An Inflection Point: Russia & China have their Cyber Forces and, after much prevarication, it is now time for a U.S. Cyber Force. By Ron Marks

2024-05-24

New Guidance For Business Email Compromise

Britain's NCSC has issued new BEC guidance, including practical steps to reduce the chances your organization suffering from these attacks.

2024-05-24

GDPR Is Six Years Old: What Is Its Impact On AI?

GDPR 6th Anniversary: GitLab, Vanta, Pipedrive & PagerDuty comment on this innovative & consequential EU data protection regulation.

2024-05-28

Seven Benefits Of Using A Managed Security Services Provider

Managed Security steps up as the superhero we didn't know we needed, shielding businesses from cyber threats. By Dmtry Kurskov

2024-05-22

IT Professionals Can Earn 35% More By Switching To AI

Career Opportunities: As businesses rush to make big investments in AI, demand for technology professionals with the right skills has tripled.

2024-05-22

2024 and beyond: Top six cloud security trends

Watch this webinar to find out about six emerging trends that are dominating the cloud cybersecurity landscape. Watch now

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

AET Europe

AET Europe

AET Europe is specialised in creating technological solutions for user identification and authentication.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

AuthX

AuthX

AuthX provides secure and seamless log-in capabilities through strong authentication and integrations.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.