FREE TO VIEW


« Back to News

2022-09-17

A New Supply Chain Security Solution

Organisations of any size are enabled to collaborate on and share data in near real-time, confident in the trustworthiness of that data.

2022-09-17

Welcome To NATO - Finland’s Parliament Attacked

The attack against the Helsinki parliament occurred the same day that President Biden signed off Finland & Sweden’s accession into NATO.

2022-09-19

CISA's Threat Intelligence Program Was Defective

Contextual Information: CISA's threat intelligence advice for US federal agencies is criticised for lacking sufficient actionable detail.

2022-09-19

How to Manage Cybersecurity Staff Shortages

Lateral Thinking & Empathy: It still takes an experienced human to interpret critical data and identify the most volatile threats. By Chris Peregrine

2022-09-16

Containers Are Temporary, But Container Data Is Not

Keep A Lid on It: Containerisation has benefits for application development. It also holds challenges for data backup & recovery. By Florian Malecki

2022-09-15

Three Simple Steps To Effective Cybersecurity

Left, Right & Up: Three key steps that all organisations should follow if they are to ensure effective cybersecurity protection. By Allen Downs

2022-09-15

The NSA Hacked Huawei Long Ago

The NSA penetrated Huawei's network technology ten years ago and can likely take steps to restrict & prevent any damaging or malicious activity.

2022-09-15

Using SAST To Prevent Zero Day Vulnerabilities

Static Application Security Testing: SAST solutions are widely agreed to be an important part of a secure software development lifecycle.

2022-09-15

Five Cloud Security Mistakes Your Business Should Avoid

Cloud security is crucial to your company’s data safety. Familiarize yourself with these cloud security mistakes that your business should avoid.

2022-09-14

NATO Secrets Found For Sale On The Dark Web

Insecure Channels: Secret NATO documents exfiltrated from supposedly secure Portuguese military computers identified by US intelligence.

2022-09-14

Securing Hybrid Identity

Active Directory: Hybrid environments are prone to errors & misconfigurations that leave the door wide open to cyber attacks. By Guido Grillenmeier 

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Packet Storm

Packet Storm

Packet Storm is an online resource for security tools, whitepapers, exploits, and advisories on computer security issues.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Adeptis Group

Adeptis Group

Adeptis are experts in cyber security recruitment, providing bespoke staffing solutions to safeguard your organisation against ever-changing cyber threats.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

Vehere

Vehere

Vehere specialises in mission critical signals aquisition and analytics platform and cyber defence systems.

HITRUST Alliance

HITRUST Alliance

HITRUST provides widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Connectria

Connectria

Connectria provides cloud hosting, remote monitoring, and compliant cloud security solutions and services to enterprises, medium and small businesses.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

QAlified

QAlified

QAlified offer independent testing and quality assurance services for software projects including security testing.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

CertNexus

CertNexus

CertNexus is a vendor-neutral certification body, providing emerging technology certifications and micro-credentials for business, data, developer, IT, and security professionals.

AdviserCyber

AdviserCyber

AdviserCyber provide Cybersecurity and Compliance Solutions for Registered Investment Advisers.

Twinstate Technologies

Twinstate Technologies

Twinstate Technologies specializes in cybersecurity, proactive IT, and hosted and on-premise voice solutions.