FREE TO VIEW


« Back to News

2020-12-29

The Impact Of Brexit On British Cyber Security

The United Kingdom and the European Union have finally delivered a Brexit trade deal, but what does this mean for British cyber security?

2020-12-29

How to Close the Global Cybersecurity Skills Gap: Two Easy Steps

Although it seems a big challenge, closing the cyber security skills gap can be conducted with only two simple steps. By Jennifer Holland

2020-12-29

Is This The Hack Of The Decade?

Microsoft was hacked in the campaign against multiple US government agencies that took advantage of weaponised SolarWinds software.

2020-12-24

Major Cyber Attack On US Government Agencies Blamed On Russia

Secretary of State Pompeo has blamed Russia for what is being described as the worst-ever cyber espionage attack on the US government.

2020-12-23

You Should Prepare Your Organization For A DDoS Attack

DDoS attacks are very serious and are becoming even more costly. If you’re running a business, you have to know how to prepare for them.

2020-12-23

Plans To Divide US Cyber Command And The NSA

Outgoing Pentagon officials are seeking fast-track approval to divide the leadership of the National Security Agency and US Cyber Command.

2020-12-21

How To Optimize The DevSecOps Pipeline

DevSecOps is the method of applying essential security rudiments to the regular DevOps cycle through a coordinated effort.

2020-12-23

The SolarWinds Hack Can Directly Affect Industrial Control Systems

Sophisticated Russian hackers compromised SolarWinds' Orion platform, taking over control of IT infrastrucure & industrial control systems.

2020-12-22

The Different Types of Malware

Business owners must be aware of the implications of different types of malware and how to protect their company. By Ashley Lukehart

2020-12-24

The Impact of Covid-19 On Cyber Security Threats

The coronavirus pandemic of late 2019 and 2020 has changed the way some businesses will operate forever.

2020-12-21

Advanced Threat Detection And Response: Critical Steps

In every organisation it’s now critical to implement effective threat detection systems and respond to potential danger promptly. By Jennifer Holland

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ITpreneurs

ITpreneurs

ITpreneurs provides IT training content, Instructors, Learning Infrastructure and services to IT Training providers.

Trustwave

Trustwave

Trustwave is a leader in managed detection and response (MDR), managed security services (MSS), consulting and professional services, database security, and email security.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

First Response

First Response

First Response is a Cyber Incident Response and Digital Forensic Investigation company.

Egis Technology

Egis Technology

Egis specializes in the IC design, research and development, and the testing and sales of capacitive fingerprint sensor.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

ePlus

ePlus

ePlus designs and delivers effective, integrated cybersecurity programs centered on culture and technology, aimed at mitigating business risk and empowering digital transformation.

Trust Stamp

Trust Stamp

Trust Stamp provide Identity and Trust as a Service to answer two fundamental questions: “Who are you?” and “Do I trust you?"

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

OpenAVN (DefenseArk)

OpenAVN (DefenseArk)

Defending your life online, keeping your data safe and private. We detect digital threats magnitudes faster than the leading antivirus software.

RedLegg

RedLegg

RedLegg is a master provider of information security services, a boutique, nimble, old-fashioned customer service company that enjoys the technology battlefield.

Mediatech

Mediatech

Mediatech, specialized in managed Cybersecurity and Cloud services, a single point of contact for your company's IT and infrastructure.

Keyrus

Keyrus

Keyrus is a global consultancy that develops data and digital solutions for performance management.

Nexio

Nexio

We are Nexio. We help organisations take every NEXT step toward their accelerated digital transformation.

Cyber Advisors

Cyber Advisors

Cyber Advisors offers customizable cyber security solutions and IT services for businesses of all sizes across the nation from experts you can trust.