News

2023-11-02

Ransomware Attacks Hit A Record High

It's not just criminals who want to get your personal information for financial gain. Many popular Apps are legitimately scraping your personal data.

2023-11-07

Online Conflict In Gaza & Ukraine

The use of cyber warfare techniques has fast become integral to the Gaza conflict, adding a layer of complexity to an already difficult situation. 

2023-11-03

Bletchley Declaration On Artificial Intelligence Gets International Support

Regulating AI: An international declaration to address risks with the technology, as well as a multilateral agreement to test advanced AI Models.

2023-11-07

Five Critical Security Measures To Enforce API Security 

Application Programming Interfaces are popular targets for attack - proper attention to security & governance can reduce your risk. By Marco Palladino 

2023-11-06

Increase Security For Your Enterprise Cloud With A Next-Generation Firewall

Join this webinar to hear security experts from SANS and AWS share what a next-generation firewall is and how it redefines the concept of a firewall.

2023-11-06

Phishing Is The Hackers' Favourite Tool

Phishing is often the first stage of a larger attack, leading to data breaches, malware, ransom, identity theft & other serious consequences. 

2023-11-01

Is OAuth Authentication Secure?

Open Authorization Mitigation Strategies: A powerful tool for modern web security that needs to be used properly to reach its full potential.

2023-12-30

2023 - A Significant Year For Cyber Incidents

2023 was a year of serious, damaging cyber threats and attacks. Criminals were relentless in their methods, becoming faster & more sophisticated.

2023-11-06

Quantum Computing - Its Background & Future

Quantum computing uses quantum theory which explains the behaviour of energy and material on the atomic and subatomic levels. So What?

2023-11-15

The Dark Web Encompasses Both Criminal & Legal Activities

The term Dark Web sounds ominous and it is that part of the Internet comprising websites you can't access through the usual web browsers.

2023-11-30

Cyber Security Trends For 2024

Cybercrime is predicted to cost the global economy $8 trillion USD in 2023. By the end of 2024 the anticipated cost will be $10.5 trillion.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Komodo Consulting (KomodoSec)

Komodo Consulting (KomodoSec)

Komodo Consulting specializes in Penetration Testing and Red-Team Excercises, Cyber Threat Intelligence, Incident Response and Application Security.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

Network Intelligence

Network Intelligence

Network Intelligence are a global cybersecurity provider offering services across 6 broad spectrums - Assessment, BCMS, GRC, Professional Services, MSSP & Training.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

ECHO Project

ECHO Project

The main objective of ECHO is to strengthen the cyber defence of the European Union, enhancing Europe’s technological sovereignty through effective and efficient multi-sector collaboration.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

Syteca

Syteca

Syteca is specifically designed to secure organizations against threats caused by insiders. It provides full visibility and control over internal risks.