News

2021-02-26

New Solutions For Zero-Day Attacks

Emergency Patches: Defending against zero-day attacks is one of the most fundamentally challenging security problems yet to be solved.

2021-02-26

Social Media’s Troublesome Influence On Politics

Social media platform architectures are not primarily designed for democratic discourse, yet they are heavily used for political purposes.

2021-02-25

Australia Makes Google & Facebook Pay

Following an ugly confrontation, Google and Facebook are now required to negotiate with news outlets to pay for their content, or face arbitration.

2021-02-25

GCHQ Jammed ISIS Drones & Servers

A secret cyber operation which involved disabling drones, jamming mobile phones and targeting computer servers to block online propaganda.

2021-02-24

Cyber Security Is Crucial For Maritime Shipping

Cyber attacks targeting ocean transport are growing exponentially and present great risks to the safety of crews, vessels, cargoes and ports.

2021-02-23

Cyber Security Training Goes Gaming

A scenario-based, gamified learning tool that drives high levels of engagement through popular elements used widely in the video gaming world.

2021-02-23

Tracking Modern Slavery On The Dark Web

Human trafficking is law enforcement's biggest challenge.This vile trade goes on hidden from sight on the Dark Web and includes children.

2021-02-23

Friends Reunite As Facebook & Australia Make Up

Facebook will unblock news pages in Australia following a confrontation with the Government in which both seem to have made concessions.

2021-02-22

Every Employee Should Be Considered A Target

To tackle social engineering attacks, the challenge is to identify & prevent every possible point of a breach in a company’s security system.

2021-02-22

Cyber Security Insights For Executives

Implementing the best cyber security practice isn’t just about firewalls and encryption, it’s about changing the entire culture of your organisation.

Perimeter 81

Directory of Suppliers

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Infinigate UK

Infinigate UK

Infinigate is a value-added distributor of IT security solutions to protect and defend IT networks, servers, devices, data, applications, as well as the cloud.

Verisign

Verisign

Verisign is a leader in Domain Names & Internet Security, providing protection for websites and enterprises around the world.

CHG-MERIDIAN

CHG-MERIDIAN

CHG-Meridian provide end-to-end technology management services covering everything from initial consultancy to certified data erasure at the end of the lifecyle.

CIRT.ME

CIRT.ME

National Computer Incident Response Team of Montenegro.

Applicure Technologies

Applicure Technologies

Applicure Technologies develops the leading multi-platform web application security software products to protect web sites and web applications from external and internal attacks.

ACL

ACL

ACL is a software company specializing in Governance, Risk Management and Compliance (GRC) solutions.

4iQ

4iQ

4iQ fuses surface, social, deep and dark web sources to research and assess risks to people, infrastructure, intellectual property and reputation.

Reservoir Labs

Reservoir Labs

Reservoir Labs' mission is to make the world safer, cleaner, more secure and more efficient through the application of radical high-performance computing technologies.

Virsec Systems

Virsec Systems

Virsec detects and remediates previously “indefensible” advanced memory-based attacks on critical applications and server endpoints.

CUJO AI

CUJO AI

CUJO AI is the global leader in the development and application of artificial intelligence to improve the security, control and privacy of connected devices in homes and businesses.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Cyber Polygon

Cyber Polygon

Cyber Polygon Cyber Polygon is an annual online exercise which connects various global organisations to train their competencies and exchange best practices.