FREE TO VIEW


« Back to News

2020-10-06

Facebook Too Slow At Removing Fake News

A recently fired Facebook employee has denounced the company’s handling of misinformation and election interference.

2020-10-05

Organisations Must Use Cyber Security Tools For Remote Working

Remote working is the new normal for many organisations and many believe this is going to be, at least partially, the new way of working.

2020-09-30

What You Need to Know About 5G

5G Networks are the new generation of mobile internet connectivity on smartphones and other devices. What difference will 5G make to our lives?

2020-09-29

The Effects Of The Internet On Society

The Internet has turned our existence upside down. It has revolutionised daily communications but has both positive and some negative effects.

2020-09-28

Confidential US Court Documents Published On The Dark Web

Across the USA, local governments & public sector entities have endured a wave of ransom attacks. None more so than in Louisiana.

2020-10-14

Social Media: An Exclusive 3 Part Review

With more than 3.5 billion users, social media is now a preferred medium for businesses to reach out to its target audience. Take A Closer Look.

2020-09-28

Putin Says US & Russia Should Have A 'No Hacking' Agreement

President Vladimir Putin is calling for a reset agreement between the two countries to prevent incidents in cyberspace.

2020-09-29

How To Transmit Sensitive Information Over The Internet

Here are simple and efficient tips on how to protect the confidential data & information that you share online. By David Fisher

2020-09-25

Cyber Security Companies Exposed On The Dark Web

Over 95% of leading cybersecurity companies had their data exposed on the Dark Web in 2020, with 160,000 critical incidents risking client data.

2020-09-25

Ransomware Is On the Rise: How to Prevent Attacks

Ransomware has quickly become the greatest malware threat in the digital world. What is it and how do you prevent an attack from happening?

2020-09-24

Government, Cyber Attacks, Terrorism & Piracy

Cyber-attacks do not require large financing for weapons or recruits, but the effects can be global, immediate and devastating. By Alfred Rolington

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ForeScout Technologies

ForeScout Technologies

ForeScout delivers pervasive network security by allowing organisations to continuously monitor & mitigate security exposures & cyberattacks.

LogmeOnce

LogmeOnce

LogmeOnce provides users with solution to multiple Password problems, Single Sign-On (SSO), and Identity Management.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Kymatio

Kymatio

Kymatio are pioneers in Artificial Intelligence applied to adaptive staff strengthening, cultural change and predictive internal risk analysis.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

AB Handshake

AB Handshake

AB Handshake offers a game-changing solution for telecom service providers that eliminates fraud on inbound and outbound voice traffic.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

Datapac

Datapac

Datapac is one of Ireland’s largest and most successful ICT solutions and services providers. We have been at the forefront of technology innovation in Ireland for the past three decades.

COGITANDA Dataprotect

COGITANDA Dataprotect

COGITANDA are a group of companies focused on dealing with cyber risks, managing them and insuring them.

BlazeGuard

BlazeGuard

At BlazeGuard, we understand that navigating the complex world of cybersecurity can be challenging. That’s why we make it our mission to simplify the process for you.