FREE TO VIEW


« Back to News

2022-05-09

India Issues A Directive For Reporting Cyber Incidents

The Indian government has issued a directive requiring organisations to report cyber security incidents to CERT-IN within six hours of their discovery.

2022-05-09

Only 3% Of Cyber Security Startups Are Led By Women

A new report finds that of the 654 startups that raised more than $1,000,000 in funding in 2020 and 2021, only 22 were led by female CEOs.

2022-05-09

Is Europe Ready For Cyber Warfare?

The European Commission wants an EU-wide “cyber shield” of security operations centres to provide an early-warning system for cyber attack.

2022-05-06

Cybersecurity Lessons From Ancient History

Nothing New: Ransomware operates in the same way as the Trojan Horse and history can teach us a lot about cyber security today. By Phil Ashley

2022-05-05

Are Your Employees The Weakest Link Against Cyber Crime?

The vast majority of cyber attacks involve employee error. A well-trained workforce is the greatest defence you can have. By Steve Whiter

2022-05-05

Find Your Security Vulnerability Before Hackers Do

Where is your network the most vulnerable? Here is a three point plan to fix the problem now, before hackers exploit it. By Keith Bromley

2022-05-05

Predictive Analytics Are The Future For Cyber Security

Organisations need a strategy to protect themselves and their data from growing cyber security threats. Predictive Analytics can help do that.

2022-05-04

Five Eyes Warn Of Russian Cyber Attacks

Five Eyes intelligence call for immediate action by critical infrastructure organisations to “prepare for and mitigate potential cyber threats”.

2022-05-04

Improve Your Password Security

Using the same passwords on multiple websites increases your cyber risk. Here is how to better protect your online accounts. By Adenike Cosgrove

2022-05-04

Hackers Are Blasting Facebook Users With Phishing Emails

A False Sense Of Urgency: A large scale phishing campaign is targeting Facebook users to steal their passwords & other personal information.

2022-05-03

Lapsus$ Hackers Targeted T-Mobile

Teenage Rampage: The Lapsus$ hacking group got acces to T-Mobile’s source code using stolen credentials, before their final arrest.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Redicom

Redicom

Redicom is an independent consulting agency focusing on identity management, strong authentication and single-sign-on.

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets (CS4CA)

Cyber Security For Critical Assets is a global series of summits focusing on cyber security for critical infrastructure.

Cybernetic Global Intelligence (CGI)

Cybernetic Global Intelligence (CGI)

CGI is a global IT Security firm that helps companies protect their data and minimize their vulnerability to cyber threats through a range of services such as Security Audits and Managed Services.

CyberSec.sk

CyberSec.sk

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

adaware

adaware

adaware is an award-winning security and privacy software provider, empowering users to connect with confidence.

Cynterra

Cynterra

Cynterra is a next generation cloud cyber security and data analytical service provider offering cloud security compliance, data protection, visibility and threat protection services.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Analygence

Analygence

ANALYGENCE is your trusted partner for mission support, cyber solutions, and management services.

Solvere One

Solvere One

Solvere One is a managed service provider (MSP) focused on corporate consulting and partnership.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Thoropass

Thoropass

Thoropass (formerly Laika) helps you get and stay compliant with smart software and expert services.

Internet Watch Foundation (IWF)

Internet Watch Foundation (IWF)

Since the early days of the internet, our job has been to help child victims of sexual abuse by hunting down and removing any online record of the abuse.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.