News

2023-07-05

A Decade Of ‘Bad Magic’ In Cyber Espionage

Sophisticated Malicious Activities: A modular framework codenamed CloudWizard, which can take screenshots, record microphones & steal Gmail.

2023-07-04

The Limitations of AI

'Truth Is The Bottom Line': Carl Bernstein has warned that Artificial Intelligence is creating serious challenges for the future of journalism.

2023-06-05

Take Practical Measures To Avoid An Attack

The Common Threat: Failing to implement basic cyber security measures and not training your people presents an open door to hackers.

2023-06-02

How To Counter Covert Action In The Digital Age

The case of Iran shows that countering covert action in the digital age requires persistence. Also, it's unlikely to stop. By James Shires 

2023-06-02

Lawyer Admits To Using ChatGPT 

Unprecedented Circumstance: A New York lawyer is in trouble after using ChatGPT to verify case references which were found to be non-existent.

2023-06-01

Cyber Security In An Ever-Growing Digital World 

Digital Transformation: As more data-driven infrastructure technologies are introduced, the risk of cyberattacks increases. By Carl Shallow

2023-05-31

Microsoft 365 Under Threat From A New Phishing Tool

‘Greatness’: A sophisticated Phishing-as-a-Service tool deployed against manufacturing, healthcare & technology companies that use Microsoft 365.

2023-05-31

Can Automation Help Bridge The Cyber Skills Gap?

Finding key cybersecurity staff is increasingly difficult - UEBA, Threat Intelligence Automation & SOAR can offer solutions. By Tim Wallen

2023-05-29

Demystifying Data Privacy Compliance

The Importance Of Data Privacy Compliance: Learn the truth behind 6 common myths and avoid costly mistakes that could harm your business.

2023-05-30

Deepfakes Are A Growing Threat

Left unregulated, entire populations could have their opinions influenced by deepfakes delivering disinformation and distorting true events.

2023-05-30

Always-On Protection Using Immutable Storage

Immutability In Action: In the ever-changing world of data security compliance, Immutable Storage offers an ever-reliable solution. By Richard Massey.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

Cyber Police of Ukraine

Cyber Police of Ukraine

Cyber Police of Ukraine is a law enforcement agency within the the Ministry of Internal Affairs of Ukraine dedicated to combating cyber crime.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Cyber Pop-Up

Cyber Pop-Up

Cyber Pop-Up provide on-demand access to top security experts. No recruiting. No onboarding. No overhead costs.

Visible Statement

Visible Statement

Visible Statement is a computer-based delivery system designed to insure the retention and recall of your most important security training messages.

Unlimited Technology

Unlimited Technology

Unlimited Technology offers a wide range of talent and experience, from assessing your requirements to implementing technologically advanced security solutions to best fit your needs.

Soteria

Soteria

Soteria is a global leader in the development, integration and implementation of advanced cyber security, intelligence and IT solutions, delivering complete end-to-end solutions.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Eficens Systems

Eficens Systems

Eficens Systems is a global IT services and consulting company. We specialize in empowering businesses to harness the potential of Information Technology as a strategic asset.

Chorus

Chorus

Chorus are a leading Managed Security Service Provider (MSSP), and member of the Microsoft Intelligent Security Association (MISA), with three Microsoft Advanced Specialisations in security.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.