For continued FREE access to Articles and Directory Listings please Login to your Account or Sign Up.

Subscribe Login

2021-05-31

WEBINAR: How To Architect An Identity Management Strategy In AWS

17th June | An IAM strategy can help organizations grant users and customers access to the right resources under the right conditions.

2021-06-14

Beware Of Credentials Phishing

Criminals are impersonating legitimate services by creating lookalike websites where unsuspecting users disclose their critical account information.

2021-06-14

Questions Business Leaders Should Ask Themselves

Business leaders need to take a firm grip on the cyber risks their organisations are facing and make sure they stay up to date with potential threats.

2021-06-14

FBI Recover Ransom Paid To Pipeline Hackers

The FBI has recovered most of the $4.4 million ransom payment made to Russian hackers after a cyber attack on the largest fuel pipeline in the US.

2021-06-14

Singapore Is The Cyber Attack Hotspot

Leading cyber security firms agree that Singapore is the regional focus for being both source and target of accelerating online threat activity.

2021-06-14

Worldwide Internet Outage Caused By Single Configuration Error

The June 8th global internet outage has been traced to a single configuration error at a little known IT infrastructure company named Fastly.

2021-06-11

Equality Goes Missing In The Digital Industry

Women are less likely than men to have specialist digital skills or work in digital technology and are poorly represented in senior leadership jobs.

2021-06-10

Closing The Space Between Cybercrime & Cybersecurity

Failing to understand the intersection between the threats posed by cybersecurity and cybercrime leaves blind spots wide open to exploitation.

2021-06-09

The Cyber Revolution’s Effects on International Trade

Digital connectivity is transforming the ways nations trade. It also enables Modern Slavery, Digital Piracy and growth in Cyber Crime (£).

2021-06-08

Criminal Messaging App Leads To Widespread Arrests

Operation Trojan Shield: 800 suspected criminals arrested, 8 tons of cocaine and $48m seized in a Police sting using a fake secure messaging app.

Subscribe!

Perimeter 81

Directory of Suppliers

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

WEBINAR: How To Architect An Identity Management Strategy In AWS

WEBINAR: How To Architect An Identity Management Strategy In AWS

Thursday, June 17, 2021 - In this webinar, SANS and AWS Marketplace will provide guidance on how to architect and execute an IAM strategy with AWS services and third-party identity management solution

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

Information Security Group (ISG) - Royal Holloway

Information Security Group (ISG) - Royal Holloway

The Information Security Group, Royal Holloway, University of London, is an Academic Centres of Excellence in Cyber Security Research.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Telecommunications, Media and Technology.

Global Data Sentinel

Global Data Sentinel

Whether your data is at rest or in transit, on your network or in the cloud, it will always be secure with our advanced identity management and encryption technologies.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Sovrin Foundation

Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world's first self-sovereign identity (SSI) network.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

ADL Consulting

ADL Consulting

ADL Consulting provide information security-related consultancy and training support to businesses across the UK. Our services include ISO27001, GDPR, Cyber Essentials and training.