News

2023-12-08

USA & Britain Accuse Russia Of Hacking

Russia is accused of carrying out hundreds of highly targeted hacks against politicians, civil servants, journalists, academics & other institutions.

2023-12-08

Guidelines For AI Systems Development

New joint guidelines for building secure AI systems present developers with complex challenges, along with some big benefits. By Martin Davies.

2023-12-07

Unified Patient Data Platform For British Healthcare

The controversial US technology firm Palantir has been given a $400m contract to build a new patient data platform for the National Health Service.

2023-12-06

Global Guidelines For Artificial Intelligence Agreed

International agreement on recommendations for the development of AI systems, whether building a new AI tool, or improving an existing one.

2023-12-06

British Nuclear Power Facility Attacked

Despite official denials, the Sellafield nuclear fuel reprocessing site is reported to have been hacked by threat actors linked to Russia & China.

2023-12-06

Cyber Criminals Go Phishing

Phishing Trends Examined: Understanding the different types of phishing threats your organisation will encounter is crucial for network defence.

2023-12-05

The OSI Model's Role In Building A Secure Network Architecture

Open Systems Interconnection: An intuitive way of examining network operations, which makes it easier to resolve issues affecting network protocols.

2023-12-04

Trouble At Three

Thousands of Three mobile customers in the UK say they could not get signal on their phones over the weekend and the problem is persisting.

2023-12-01

Fake Login Pages To Steal Bank Data

Octo Malware: Customers of some of Australia’s major Banks are being caught out by a convincing campaign, designed to steal personal data.

2023-12-04

The Global Effects Of The Internet On Society

The Internet is the decisive technology of our age, driving both technological change and the way that human societies work & relate to each other.

2023-11-30

Attack On Denmark's Critical Infrastructure

Massive Russian Cyber Attack: Details are emerging of a sequence of crippling large-scale attacks on Danish energy companies in May 2023.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Maryville Online - Cybersecurity Program

Maryville Online - Cybersecurity Program

The Cybersecurity Program at Maryville Online is designed to help students reach opportunities in cybersecurity leadership and management through an entirely online curriculum.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Seavus

Seavus

Seavus is a software development and consulting company with a proven track-record in providing successful enterprise-wide business solutions including Managed Security Services.

Procsima Group

Procsima Group

Procsima Group was created to help you achieve good IT management and security excellence.

CashShield

CashShield

CashShield is an end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

Council to Secure the Digital Economy (CSDE)

Council to Secure the Digital Economy (CSDE)

CSDE brings together companies from across the ICT sector to combat increasingly sophisticated and emerging cyber threats through collaborative actions.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

ISA Security Compliance Institute (ISCI)

ISA Security Compliance Institute (ISCI)

ISCI, a not-for-profit automation controls industry consortium, manages the ISASecure™ conformance certification program for industrial automation and control systems.

TechForing Ltd.

TechForing Ltd.

TechForing Ltd. works for business organization's cyber security and cyber crime incident managements. We help business to secure their business online.

NTT Group

NTT Group

NTT offers agile, scalable technology services to bring it all together seamlessly, securely, and sustainably. We help you adopt a holistic security approach across your network, clouds, applications.

TheGreenBow

TheGreenBow

TheGreenBow is a trusted VPN software company. We help organizations and individuals become cyber-responsible. For this, we design and develop reliable and easy-to-use solutions.

SubCom

SubCom

How Much Do You Trust Your Endpoint? With our ‘Habituation Neural Fabric’ based endpoint security platform, you can observe and manage the Trust Score of your endpoints in real-time.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.