News

2023-10-17

SIM Swapping Cyber Crime 

SIM card duplication is a specialised form of fraud, enabling identity theft, impersonation and other crimes, with serious consequences for victims.

2023-10-17

Israel & Hamas: EU Issues TikTok A Warning

Fake News & Disinformation: The European Union has issued letters to top social media executives over a flood of misinformation on their platforms.

2023-10-17

The Israeli-Hamas Conflict Shows Cyber Warfare Is The New Normal

Hacktivist groups have joined the conflict online, disrupting government websites, civil services & financial institutions. By Jeremiah Fowler

2023-10-16

Electric Vehicles: The Hacking Risks 

As the world transitions to electric vehicles, there are numerous risks to consider, not only the vehicles, but in the charging network & elsewhere.

2023-10-16

The Expensive Costs Of HIPAA Noncompliance & How To Avoid Them

Companies operating in the US healthcare sector must comply with HIPAA rules to protect the privacy of patient data. Noncompliance can be costly.

2023-10-16

Understanding The Threat Of QR Codes & Quishing

Don't Take The Bait: What is quishing? What are the risks to your organisation and what can you do to mitigate them? By Steve Jeffery

2023-10-13

Domain Phishing: Antidotes In Today’s Market

Phishing Threats: Doubling down on security measures is the key to protecting not only your web address but your business brand. By Brian Lonergan

2023-10-17

Out-Sourcing Can Compromise Cyber Security

Out-sourcing cyber security can save company costs and access specialized skills. But there are several risks, like vendor lock-in & non-compliance.

2023-10-13

Mobile Banking Apps - Security & Risks

The consequences of a security breach in a mobile banking can be devastating. What are the issues that make banking apps so vulnerable?

2023-10-10

Ten Reasons Your Enterprise Could Benefit From XDR Security

Extended Detection & Response: XDR has emerged as a game-changing advanced solution for enterprise cybersecurity. By Cormac Reynolds

2023-10-10

Sony Falls Victim To CLop Ransom Attack

Sony Interactive Entertainment has confirmed that the personal information of thousands of former & current employees has been exposed.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Logpoint

Logpoint

Logpoint is a creator of innovative security platforms to empower security teams in accelerating threat detection, investigation and response with a consolidated tech stack.

QTS

QTS

QTS Realty Trust, Inc. is a leading provider of secure, compliant data center, hybrid cloud and managed services.

Dataguise

Dataguise

Dataguise provides a data-centric security solution to detect, protect, and monitor sensitive data in real time across all data repositories, both on premises and in the cloud.

Stormshield

Stormshield

Stormshield is a European leader in digital infrastructure security. We offer smart, connected solutions in order to anticipate attacks and protect digital infrastructures.

TechArch

TechArch

TechArch helps customers to optimize their investments in cybersecurity by providing them independent and vendor-neutral consultation and guidance.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

S2S Group

S2S Group

S2S Group specialise in the destruction and management of IT assets at the end of the lifecycle.

Center for Cyber & Homeland Security (CCHS)

Center for Cyber & Homeland Security (CCHS)

The Center for Cyber and Homeland Security at Auburn University is a nonpartisan think tank that works to develop innovative strategies to address current and future threats to the United States.

Sovereign Intelligence

Sovereign Intelligence

Sovereign Intelligence provides automated insight into the relative intensity of hidden Cyber, Brand, and Financial Risks to your company.

Tangible Security

Tangible Security

Tangible employs the most sophisticated cyber security tools and techniques available to protect our clients’ sensitive data, infrastructure and competitive advantage.

CyberPeace Foundation

CyberPeace Foundation

CPF is a think tank of cybersecurity and policy experts with the vision of pioneering Cyber Peace Initiatives to build collective resiliency against CyberCrimes and global threats of cyber warfare.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Stronger International

Stronger International

Stronger International provides expert cyber services and training to organizations and individuals to enhance IT and security knowledge.

eGyanamTech (EGT)

eGyanamTech (EGT)

eGyanamTech provides robust security solutions tailored for Operational Technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems used in critical infrastructure systems.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.