News

2024-04-02

Data Compliance When Using MS Copilot

Implementing Microsoft Copilot: You’ve heard the hype, everyone wants it, but how do you implement it without causing harm? By Mike Bellido

2024-04-02

The Dynamic Influence Of AI On Business Cybersecurity

Cybersecurity professionals have a responsibility to maintain control over AI & establish clear guidelines over its use. By Jason Kemmerer

2024-04-02

Prioritising Prevention Is Better Than Paying Ransom

Wake Up: By working together and staying vigilant, we can protect ourselves from the damaging effects of ransomware. By Brandon Rochat

2024-04-02

Dark Data Helps Boost Business

Unveiling Hidden Insights: The untapped potential of dark data can have a transformative impact on business. By Jacques du Preez

2024-03-29

British Parliament Debates Chinese Cyber Attacks 

Prime Minister Rishi Sunak has said China presents an “epoch-defining challenge” arising from cyber attacks on MPs and the Electoral Commission.

2024-03-13

World Backup Day 

The 31st of March Is World Backup Day: One day set aside as a reminder to back up and protect your files & data, even if it’s only once a year.

2024-03-28

Beware Of Online Fraud When Booking Your Summer Holiday

April is a key time of year for the travel industry as consumers start to make summer holiday plans. This also provides fraudsters an opportunity.

2024-03-27

Why Are Enterprises Slow To Adopt Observability?

Increasing complexity means the demands on IT departments to keep their systems functioning correctly gets tougher every day. By Rob Johnson

2024-03-28

Shielding Your Teen's Digital Footprint

A Parent's Guide to Child Identity Theft Prevention: Every year, in the United States alone, 1 in 50 children falls victim to cybercriminals.

2024-03-27

The Need For Cyber Security Education & Preparedness In The Moving Industry

Secure your business with vital cyber security education and preparedness in the moving industry. Ensure data safety and build customer trust.

2024-03-25

Scottish Health Service Patient Data Hacked & Stolen

The National Health Service in Scotland has been targeted in a "focused and ongoing" cyber attack that might compromise critical patient data.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Information Security Media Group (ISMG)

Information Security Media Group (ISMG)

Information Security Media Group is the world’s largest media organization devoted solely to information security and risk management.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

MIT Internet Policy Research Initiative (IPRI)

MIT Internet Policy Research Initiative (IPRI)

IPRI's mission is to work with policy makers and technologists to increase the trustworthiness and effectiveness of interconnected digital systems

Global Station for Big Data & Cybersecurity (GSB)

Global Station for Big Data & Cybersecurity (GSB)

GSB is an interdisciplinary research hub to cover big data, information networks, and cybersecurity.

DXC Technology

DXC Technology

DXC Technology helps global companies run their mission critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

TwoThreeFour

TwoThreeFour

ThreeTwoFour provide tailored cyber security solutions, delivered by highly-skilled, experienced consultants who respond to the real needs of you and your business.

Infostream

Infostream

Infostream is a leading integrator of Digital Transformations Solutions (DTS); Public, Private, and Hybrid Cloud; Cybersecurity; Data Integrity; DevOps, DevSecOps, and Infrastructures.

Trackd

Trackd

At trackd, we’re re-imaging vulnerability remediation for the benefit of the entire cyber security community. Automating Vulnerability Remediation without the Fear of Disruption.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.