FREE TO VIEW


« Back to News

2023-11-20

Bridging The Gap Between Cybersecurity & Business Goals

The Evolving Role Of The CISO: The modern CISO has pivotal responsibilities across the oprganisation & faces formidable challenges. By Brandon Rochat

2023-11-20

Best Practices For Securing Enterprise IoT Devices

Most users leave their credentials on IoT devices, which exposes them to attackers. These are the best practices for securing their cybersecurity.

2023-11-17

CEO Of OpenAI Is Dismissed

Sam Altman is fired from OpenAI as the Board loses confidence in his leadership saying he was not "consistently candid with his communications".

2023-11-17

How To Conduct A HIPAA Risk Assessment

Navigating HIPAA: The US Health Insurance Portability & Accountability Act provides a vital shield for sensitive patient data. By Narendra Sahoo

2023-11-17

Four Reasons To Use A Dedicated IP In 2023

Elevate Online Security With A Dedicated IP: Better email deliverability, a lower chance of getting blacklisted & it’s essential for remote workers.

2023-11-17

Mid-market Organisations At Greater Risk

As large organisations grow more resilient, smaller mid-sized organisations must prioritise attack disruption as cyber-threats evolve. By Tim Anderson

2023-11-18

Surging Attacks On Israeli Websites

In parallel with continuing rocket attacks on Israel as it troops pursue Hamas in Gaza, hacktivist groups are delivering an offensive cyber campaign.

2023-11-18

Mitigating The Security Risks Of Black Friday 

Online data transfers significantly rise during Black Friday as consumers search for bargains, providing rich opportunities for cybercriminals.

2023-11-14

Australian Ports Recovering After Large-Scale Attack 

A cyber security incident shut down one of Australia's largest multiport port operators, affecting maritime freight in and out of the country.

2023-11-14

BEC Attacks: Trends & Predictions For 2024

BEC attacks pose a significant threat to businesses, but with the right defensive measures businesses can effectively mitigate these attacks.

2023-11-14

The Cyber Skills Gap Is Still Not Getting Better

Despite growing to 5.5 million professionals worldwide, the industry still needs millions of qualified workers to defend against digital threats.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

Bureau Veritas

Bureau Veritas

Bureau Veritas are a world leader in Testing, Inspection and Certification. We provide certification and training services in areas including cybersecurity and data protection.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Red Points

Red Points

Red Points protects your brand and content in the digital environment.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

PNGCERT

PNGCERT

PNGCERT is the national Computer Emergency Response Team (CERT) for Papua New Guinea.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

MicroAge

MicroAge

Powered by five decades of experience, lasting partnerships, client relationships, and the values that guide us daily, MicroAge is here to help you secure, accelerate, and transform your business.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Orbis Cyber Security

Orbis Cyber Security

Orbis is one of the leading cybersecurity company in USA. Our cybersecurity specialist defends your data, combat threat, and modernize your compliance.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

SecureAck

SecureAck

From our A-Op SaaS automation platform to Managed Automation-as-a-Service (MAaaS), SecureAck offer powerful security automation the way that best suits your organisation's needs.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.