FREE TO VIEW


« Back to News

2022-03-31

WEBINAR: How To Build A Successful Zero Trust Strategy For Data Analytics

Join this webinar to learn how to combine zero trust controls and technology into a best-practice architecture that will help protect your AWS Cloud.

2022-03-30

Australia Sues Facebook Over Scam Advertising

Facebook & Australia Have History: Now the governnment has accused the social media platform of misconduct in running fake crypto adverts.

2022-03-23

Rated Cybersecurity Software & Tools

Powerful cyber security software is critical to meeting cyber security and compliance needs. Here are some of the best rated. By Charles Richard

2022-04-04

Improving The Security Of Open Source Software

Open Source Software has changed the world of IT and its popularity is growing fast - one of many reasons why it needs to be properly protected.

2022-10-11

In Many Cases Active Directory Is The Last Line Of Defence

Organisations of all sizes across every industry are failing to address Active Directory security gaps that leave them vulnerable to cyber attacks.

2022-04-01

Germany Warns About Russian Anti-Virus Software

Germany's cyber security authority has issued a warning against using anti-virus software from the Russia-based service supplier Kaspersky.

2022-03-30

The Global Cyber Security Market Set To Grow By $190 Billion

Annual market growth well over 12% will be driven by increased demand from mobile usage, the IoT and many more Intenet users worldwide.

2022-03-23

The Use Of Intellectual Property As An Instrument Of War

Ukraine has taken the rare step to use intellectual property as a war weapon by leaking critical operating details of a Russian Nuclear plant.

2022-03-29

LAPSUS$ Hackers Claim Responsibility For Large Scale Corporate Attacks

Source Code: Ubisoft may be the latest victim of hackers that have already attacked the chipmaker Nvidia and electronics giant Samsung.

2022-03-29

Conti Operates Like A Sophisticated Corporation

Hidden In Plain Sight: Staff think they are working for a legitmate Russian High-Tech firm, but in reality it is a notorious ransomware group.

2022-03-28

Operating Technology Security Issues Are Increasing

Industrial control systems have become more connected than ever and good cyber security practices to protect Operating Technology are vital

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

OASIS Open

OASIS Open

OASIS Open is where individuals, organizations, and governments come together to solve some of the world’s biggest technical challenges through the development of open code and open standards.

PhishLine

PhishLine

PhishLine helps Information Security Professionals meet and overcome the increasing challenges associated with social engineering and phishing.

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

Computer Forensic Services

Computer Forensic Services

Computer Forensic Services are digital evidence specialists. Practice areas include Information Security, e-Discovery, Law Enforcement Support and Litigation.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Governikus

Governikus

Governikus provides solutions for secure data transport, authentication, the use of electronic signatures and cryptography as well as for long-term storage.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

Gita Technologies

Gita Technologies

Gita Technologies works to create integrated solutions to the thorniest problems in the field of intelligence and cyber today.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Green House Data

Green House Data

Green House Data is a managed services provider delivering hybrid solutions to enterprises who need secure IT environments and efficient management of their critical applications and business data.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

Framatome

Framatome

Framatome Cybersecurity portfolio is directly inspired by its unique experience in nuclear safety for critical information systems and electrical systems design.

Data Pie Cybersecurity

Data Pie Cybersecurity

The Data Pie Cybersecurity Consulting offers a 360° around protection for your IT security. Security awareness solutions and consulting.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.