News

2024-05-13

Russia’s Malicious Cyber Activity Condemned

Britain has joined with the EU, Germany and Czechia in condemnation of burgeoning malicious cyber activity by Russian spy & intelligence agencies.

2024-05-07

Neutralizing Cyber Threats In SaaS Applications

Any business using SaaS applications opens itself to numerous security risks. Here are the best practices to prevent costly breaches. By Matt Verlaque

2024-05-08

Microsoft Reforms ‘Weak’ Cyber Security Strategy

Do Security: Microsoft's reputation for security is suffering after criticism of the company’s weak cyber practices and lax corporate culture.

2024-05-20

Cyber Tensions & Capabilities In Asia

Governments across the Asia-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity.

2024-05-19

Ukraine Has An AI-Generated Government Spokesperson

Digital Diplomat: Ukraine has an AI-generated spokesperson called Victoria Shi who will make official statements on behalf of its Foreign Ministry.

2024-05-08

New AWS Webinar: Harnessing The Power Of SIEM

On Demand: In this AWS and SANS webinar, experts will help you understand how to most effectively use Security Information & Event Management.

2024-05-17

The Ransomware Threat Landscape Is Diversifying

Ransomware & Digital Extortion: The frequency of attacks is going up, partly driven by smaller new threat groups becoming more active.

2024-05-16

The Global Corporate Digital Security Landscape

Suspicious Internal Activity: Attackers persistently seek to infiltrate organisations by abusing the trust inherent in vendor-client connections.

2024-05-07

The US Has A New Global Cyber Security Strategy

After years of escalating threats from China, Russia and cyber criminals, the US wants to build up international cyber security cooperation.

2024-05-07

British Military Personnel Data Hacked

Personal details of thousands of serving British soldiers, sailors and air force members have been exposed in a data breach at a payroll system.

2024-05-10

Three Steps To Secure Your Organisation Against Cyber Attacks

To address brand impersonation, it is important to be aware of the emergence of imitation websites or other forms of fraudulent online presence.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Digital Gurus Recruitment

Digital Gurus Recruitment

Digital Gurus provide specialist recruitment services in areas including IT and information security

Watchdata Technologies

Watchdata Technologies

Watchdata Technologies is a pioneer in digital authentication and transaction security.

Tech Mahindra

Tech Mahindra

Tech Mahindra is a global leader in IT solutions, BPO, business consulting services & digital technologies.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

bluedog Security Monitoring

bluedog Security Monitoring

Sentinel from bluedog provides powerful and affordable internal network monitoring.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.

Argantic

Argantic

Argantic aims to help organisations thrive and reach their full potential in a modern cloud-centric era.