News

2019-10-07

Over 2 Million Magecart Detections

RiskIQ has detected explosive growth of Magecart skimming code, affecting over 2 million websites, including 18,000 hosts that were directly breached.

2019-10-07

A Cyber Compliance Economy

As the IoT expands, companies are growing more concerned with the question of corporate liability in case of cyber attacks. By Joao Paro.

2019-10-07

Hackers Invade Routers To Steal Payment Card Details

IBM find evidence that hackers have created malicious scripts they can deploy on commercial-grade 'Layer 7' routers to steal card details.

2019-10-07

The Strange Case Of The The Missing Crypto-Queen

Cryptocurreny: Fraud, theft and bankruptcy. Financial regulators are simply unable to keep up with the use and abuse of virtual currencies.

2019-10-04

Governments Urge Facebook To Create Backdoor Access To Encrypted Messages

The USA, United Kingdom and Australia are all asking Facebook to delay plans for end-to-end encryption across its messaging services.

2019-10-04

The Future Of Cyber Security Is AI

A growing number of experts believe that Artificial intelligence will be at the forefront of the next wave of cybersecurity tools.

2019-10-04

Russian Government Hacking Groups Often Work Alone

Russia's state-sponsorerd hacker groups each use their own dedicated development teams, working with similar malware toolkits and frameworks.

2019-10-04

New US Cyber Attacks On Iran

Locked & Loaded: A repeat of a recent covert cyber-attack on Iran by US Cyber Command is growing more likely.

2019-10-03

Confidential Data On 24.3m Patients Found Exposed Online

Researchers found almost 600 medical archives freely accessible, containing 24.3 million data records from patients located in 52 countries.

2019-10-02

By 2021 The Cost Of Cybercrime Will Be $6 Trillion

The Internet is being used in similar ways that the oceans were employed for privateering, we are now seeing this in cyber crime and cyber warfare.

2019-10-02

Easy Cyber Knowldege Ch.4 The Internet of Things (IoT)

The IoT allows objects to connect and share data and this affects humans in many ways: Privacy, Security and Legal Standards are all at issue.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Remediant

Remediant

Remediant is the leader in Precision Privileged Access Management. We protect organizations from ransomware and data theft via stolen credentials and lateral movement.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Information System Authority (RIA) - Estonia

Information System Authority (RIA) - Estonia

RIA ensures the interoperability of the state’s information system, organises activities related to information security, and handles security incidents in Estonian computer networks.

Agility Networks

Agility Networks

Agility Networks is a technology company providing integrated services and solutions for Digital Transformation and Cyber Security.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

OurCrowd

OurCrowd

OurCrowd is a leading equity crowdfunding platform for investing in global startups.

Grayshift

Grayshift

Grayshift is the leading provider of mobile device digital forensics, specializing in lawful access and extraction.

Contextual Security Solutions

Contextual Security Solutions

Contextual Security Solutions is a leading provider of penetration testing services and IT security & compliance audits.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Cyber Management Alliance

Cyber Management Alliance

Cyber Management Alliance is closing the divide in cyberspace by bringing together the best qualities of thought leadership and operational mastery of cyber security management.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

Saiflow

Saiflow

SaiFlow provides a tailor-made cybersecurity solution for Electric Vehicles Charging Infrastructure (EVCI), Distributed Energy Resources (DERs) and energy networks and assets.

DACTA Global

DACTA Global

DACTA was established with the aim of simplifying the perception of complexity surrounding digital security challenges and solutions.