News

2019-07-23

Privacy: Can You Trust FaceApp With Your Face?

Smartphone software used to simulate the ravages of time upon users' features is at the centre of a global cybersecurity row over its Ts&Cs.

2019-07-22

Russian FSB Hacked: "Largest data breach in its history"

Hackers have successfully targeted Russia's Federal Security Service in possibly "the largest data leak in the history of Russian intelligence."

2019-07-23

The Destabilizing Danger Of Cyberattacks On Missile Systems

Attacks that aim to disable enemy missile systems may increase the chance of them being used, not least because the systems are so vulnerable.

2019-07-22

E-Fusion And Industry 4.0

Industry 4.0 is driven by a technological fusion that is blurring the lines between the physical, digital & biological spheres. By Alfred Rolington

2019-07-22

AI Could Transform Submarine Warfare

Applying AI to ocean data helps submarine crews understand where their adversaries are, what they’re doing and what they can see.

2019-07-19

SMEs Run Outdated & Vulnerable Operating Systems

Security weaknesses in SMEs include antiquated Microsoft operating systems, encryption defects, poor patching and outdated email servers.

2019-07-22

Ten Reasons Why Senior Managers Need To Understand Cyber Security

Effective cyber security leadership requires the same skills and intellectual processes called for to lead organisations at the highest level.

2019-07-23

Five Hi -Tech Ways To Fight Off Cyber Attackers

A shift towards a tech-centric culture means people are at a much higher risk of cyber-attacks. Here are five innovative ways to stay secure.

2019-07-18

Air Travel Needs Stronger Cyber Security

Air transport faces unprecedented risks from cybercrime, the result of digital transformation and extensive reliance on communication technologies.

2019-07-18

Most Cyber Insurance Claims Result from Human Error

About three-quarters of cyber claims notified in 2018 to Canadian insurers involved some kind of “easily preventable” human error.

2019-07-18

Professionals Say Network Security is Getting Harder

In a survey, 64% of security professionals said network security is getting harder; a fifth of all respondents said it is getting much harder.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Korea Information Security Industry Association (KISIA)

Korea Information Security Industry Association (KISIA)

KISIA is a non-profit organization for the information security industry in Korea.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

InnoSec

InnoSec

InnoSec is a software manufacturer of cyber risk management technology.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

DataViper

DataViper

Data viper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Corellium

Corellium

Corellium are dedicated to supporting our peers in the ARM community who seek to build more secure, performant, and accessible software and devices.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

Centroid

Centroid

Centroid is a cloud services and technology company that provides Oracle enterprise workload consulting and managed services across Oracle, Azure, Amazon, Google, and private cloud.

SecureDNE

SecureDNE

SecureDNE are a leading provider of cutting-edge Fractional CISO, Managed Cybersecurity Services, and Cybersecurity Engineering Solutions.