News

2024-05-21

The Key To Future-Proof Encryption

Quantum Computing & Public-Key Cryptography: Hardening network communications against current and future vulnerabilities.

2024-05-28

Chatham House Cyber Conference

London 5th June: Join cybersecurity experts to explore the ever-changing digital world at the Chatham House 2024 Cyber Conference. 

2024-05-21

MOD Data Breach Shows Supply Chain Security Continues To Be A Top Priority

The most critical data assets need the highest level of protection. That means prioritizing data based on the potential impact if it is compromised. 

2024-05-21

Cloud Threats Require New Advanced Defenses

Surge In Cloud Security Incidents: Although cloud attacks are increasing very few organisations are able to mitigate risks easily and quickly.

2024-05-20

Focus On Black Basta Ransomware

US cyber defence agencies have issued a joint advisory intended to help organizations mitigate the impact of prolific & costly 'Black Basta' malware.

2024-05-20

A Critical Vulnerability In The Post-PSTIA Era 

The Human Factor: To truly fortify our cybersecurity in this new era, we must address the elephant in the room. By James O'Sullivan

2024-05-16

A Way To Build A Comprehensive Backup Strategy 

Jira Backup Best Practices: Organizations that implement these practices improve task accessibility & guarantee quick recovery with a few clicks.

2024-05-17

Christie's Auctions Knocked Offline

Spring Sales: The prestigious art auction house has suffered a systems outage affecting forthcoming sales of items worth many $millions.

2024-05-15

XZ Utils: A Fable on Proactive Risk Management

The recent attack on the XZ compression tool shows how important it is for companies to manage risks in their open-source software. By Ilkka Turunen

2024-05-10

Overcome PDF Conversion Challenges: A Step-by-Step Guide

Navigating PDF Conversion Challenges: Explore common issues and discover top tools for accurate and seamless conversions. 

2024-05-15

The Ransomware Arms Race

How Can Organisations Stay Ahead?: Seven cybersecurity experts give their insights into how organisations can tackle this relentless threat. 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Omerta

Omerta

Omerta is a global security technology and services company. We advise, consult, design, build, mitigate, protect, manage, provide and train to protect from increasing cyber threats.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Advantech

Advantech

Advantech is a leader in providing trusted innovative embedded and automation products and solutions. Activities include IoT security.

Global Security Network (GSN)

Global Security Network (GSN)

GSN focuses on specialized IT Security solutions & services for the military, law enforcement, critical infrastructure and oil & gas sectors in the Middle East.

National Cyber Security Authority (NCA) - Saudi Arabia

National Cyber Security Authority (NCA) - Saudi Arabia

The NCA is the government entity in charge of cybersecurity in Saudi Arabia and serves as the national authority on its affairs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Ethiopian Cybersecurity Association (ECySA)

Ethiopian Cybersecurity Association (ECySA)

ECySA was formed to play an influential part in the ongoing and dawning cybersecurity practices of Ethiopia, efficiently creating public and private awareness on all kinds of cyber risks and threats.

MoogleLabs

MoogleLabs

MoogleLabs leverage AI/ML, Blockchain, DevOps, and Data Science to come up with the best solutions for diverse businesses.

Gulf Business Machines (GBM)

Gulf Business Machines (GBM)

GBM is a leading end-to-end digital solutions provider, offering the broadest portfolio, including industry-leading digital infrastructure, digital business solutions, security and services.

Limes Security

Limes Security

Limes Security GmbH is the leading OT Security expert in the German-speaking region of Europe.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.