FREE TO VIEW


« Back to News

2021-08-30

Urgent Action By Microsoft To Protect Cloud Users

A massive flaw discovered in the main databases stored in the MS Azure cloud platform means that all users need to change their digital access keys.

2021-08-31

US Tech Giants To Spend Billions On National Cyber Security

Apple, Amazon, Google, IBM and Microsoft have promised to invest billions of dollars to strengthen cyber security and train skilled workers.

2021-08-30

Taliban Have Control Of US Biometric Technology

HIIDE: The Taliban has got hold of devices containing iris scans, fingerprints & biographical information used to access verified ID databases.

2021-08-27

How to Protect Your Files From Ransomware

Get Ready In Advance: A combination of efficient backup software and antivirus solution is your best bet to protect your business against ransomware.

2021-08-26

Does Your Business Require PCI DSS Compliance?

Any online businesses dealing with cardholder data automatically falls in the scope of Payment Card Industry Compliance. By Narendra Sahoo

2021-08-26

Big Data & Cloud Computing - Concurrent Technologies Of The Digital Revolution

The storage & processing of massive quantities of internet data sparked the simultaneous usage of big data and cloud computing. By Ryan Jason

2021-08-26

Islamic State Propaganda Is Persistent

Jihadist terrorist groups dedicate significant efforts to set up effective online communication campaigns and they are definitely not going away.

2021-08-25

British Military Aim To Reduce Their Attack Surface

Reducing Vulnerabilities: Britain's defence sector presents a large target area for cyber attackers to penetrate and disrupt UK military operations.

2021-08-24

Businesses Pay A High Price For Automated Bots

Automated bots operated by criminals are costing businesses an average of 3.6% of their annual revenue and can remain undetected for months.

2021-08-24

Business Leaders Can Make Big Mistakes About Cyber Security

Businesss leaders face a higher level of personal jeopardy for inadequate cyber security and they need to avoid making some dangerous mistakes.

2021-08-26

Webinar: Adapting detection and response strategies to the cloud

Thursday, September 9th | AWS Marketplace webinar: Adapting detection and response strategies to the cloud | Live Regional Versions

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Exostar

Exostar

Exostar is the cloud platform of choice for secure enterprise and supply chain collaboration solutions and identity and access management expertise.

Claranet

Claranet

Claranet are experts in modernising and running critical applications and infrastructure through end-to-end professional services, managed services and training.

CyberSAFE Malaysia

CyberSAFE Malaysia

CyberSAFE Malaysia is an initiative to educate and enhance the awareness of the general public on the technological and social issues and risks facing internet users.

Techleap.nl

Techleap.nl

Techleap.nl is a non-profit publicly funded organisation helping to quantify and accelerate the tech ecosystem of the Netherlands.

24By7Security

24By7Security

24By7Security are Cybersecurity & Compliance Specialists with extensive hands on experience helping businesses build a defensive IT Infrastructure against all cyber security threats.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

TekSek Cyber Security

TekSek Cyber Security

Preparing you for tomorrow's security threats.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Innovex Global

Innovex Global

Innovex is a full-service executive search and advisory business that engages with early-stage startups, scale-ups, and established businesses in the Fintech, Cybersecurity and Technology industries.

Invicti Security

Invicti Security

Invicti Security is an AppSec leader transforming the way web applications are secured.

Lavabit

Lavabit

Lavabit's Dark Internet Mail Environment is a secure, open-source, secure end-to-end communications platform for asynchronous messaging across the internet.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

The Security Bulldog

The Security Bulldog

The Security Bulldog distills and assimilates open source cyber intelligence to enable security teams to understand threats more quickly, make better decisions, and accelerate detection and response.

Catalogic Software

Catalogic Software

Catalogic helps clients backup, recover, manage, and protect their data across their enterprise and cloud environments with Smart Data Protection solutions.

Marlink

Marlink

Marlink smartly integrates hybrid, future-ready network solutions so you can benefit from the best available connectivity and IT to accelerate your digitalisation and empower your remote operations.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.