News

2024-02-09

Pakistan Mobile Internet Is Cut Off On Election Day

Law & Order: Pakistan's government has shut down mobile calls and data services as millions of people go to the polls to vote for a new government.

2024-02-09

Chinese Hacking Campaign Targets US Critical Infrastructure

Widespread Offensive Cyber Operations: Chinese hackers are implanting malware to disrupt daily life, were the US and China ever to go to war.

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-07

Neuralink Implant A Brain Chip In A Human

A Brain - Computer Interface: Neuralink has implanted a wireless brain chip in a human for the first time aimed at restoring motor functionality.

2024-02-07

Healthcare Has Issues With Outsourced Cyber Security

Managed Service Providers Must Improve: Cyber security providers need to build trust and show that they “care” through closer collaboration.

2024-02-07

Supply Chain: AnyDesk Customers Affected By Credentials Breach

Remote desktop software maker AnyDesk detected a major breach, requiring them to revoke security-related certificates & systems for remediation.

2024-06-14

Elections 2024 - Fake News & Misinformation  

Preserving The Integrity Of The Vote: The ready availability of AI text and image generators has greatly increased the threat to democracy.

2024-02-06

Ransomware: Businesses Are Well Equipped But Underprepared

Despite high-profile attacks targeting every industry, why are businesses still leaving themselves vulnerable to ransomware? By Duncan Bradley

2024-02-01

Cyber Attack On Georgia's State Government

The District Attorney's office prosecuting Donald Trump for electoral interference gets caught up in a cyber attack on the state government.

2024-02-05

Military Service Is An Ideal Background For A Cybersecurity Career

Addressing The Cybersecurity Talent Shortfall: Recruiters can tap into the rich diversity of skills offered by Armed Forces veterans. By Chip Daniels

2024-02-05

On Trend - Hybrid Cloud Strategies

Cloud Repatriation: Many IT leaders are returning their network systems to on-premises infrastructure, due to unexpected security & cost issues.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ThetaRay

ThetaRay

ThetaRay’s solution for Industrial cyber security protects against unknown cyber-attacks that target industry and critical infrastructure.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

High Sec Labs (HSL)

High Sec Labs (HSL)

High Sec Labs develops high-quality, cyber-defense solutions in the field of network and peripheral isolation.

Tempered Networks

Tempered Networks

Tempered Networks delivers the first purpose-built platform for IIoT cybersecurity that allows customers to connect and secure devices in minutes without the need for specialized skills.

Ordr

Ordr

Ordr Systems Control Engine. The first actionable AI-based systems control engine for the hyper-connected enterprise. You’re in control.

Technology Law Alliance (TLA)

Technology Law Alliance (TLA)

Technology Law Alliance is a specialist IT law firm focussed on the fields of technology, outsourcing and e-commerce.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

SecurelyShare Software

SecurelyShare Software

SecurelyShare Software is a security software company, specializing in data security, data privacy and data governance.

NGN International

NGN International

NGN International is a full-fledged systems integrator and managed security services provider established in 2015 in Bahrain.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

Artifice Security

Artifice Security

Artifice Security will demonstrate real-world attacks on your network, web applications, infrastructure, and personnel to expose your hidden security risks.

Verisign

Verisign

Verisign is a Global Leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

CaseMatrix

CaseMatrix

Discover a new era of legal intelligence with CaseMatrix. We identify potential class action cases arising from cyber incidents and data breaches.

Multipoint Group

Multipoint Group

Multipoint is an information security and protection solutions company operating in the South EMEA region through value-added distribution channels.

Dialog Enterprise

Dialog Enterprise

Dialog Enterprise is the corporate ICT solutions arm of Dialog Axiata, Sri Lanka’s leading connectivity provider.